The ability to manipulate data/digital information. Sub-power of Record Manipulation, Technology Manipulation and Knowledge Manipulation. Opposite to Physical Information Manipulation.
Also Called
- Byte Control/Domination/Manipulation
- Code Control/Domination/Manipulation
- Computer Data Control/Manipulation
- Data Control/Domination/Manipulation
- Datakinesis
- Digital Control/Manipulation
- Digital Power Control/Manipulation
- Electronic Data Manipulation
Capabilities
The user can create, shape and manipulate data/digital information from systems and networks, convert real objects/entities into data and vice versa, etc.
Applications
- Artificial Life Creation through data.
- Codification
- Computer Interaction
- Data Absorption
- Data Attacks
- Data Erasure
- Data Generation
- Data Recovery
- Data Solidification
- Data-Telekinesis
- Decodification
- Digital Constructs
- Digital Detection
- Digital Energy Manipulation
- Digital Evolution
- Digital Interaction
- Digital Materialization
- Digital Negation
- Digital Vision
- Download
- Electronic Communication
- GPS Manipulation
- Hacking Intuition
- Interface Creation
- Knowledge Manipulation through data.
- Malfunction Manipulation
- Malware Generation
- Malware Manipulation
- Memory Absorption
- Numerical Precision
- Programming
- Scanner Vision
- Scanning
- Self Data Manipulation
Techniques
- Data Conversion
- Digital Aura
- Digital Combat
- Digital Empowerment
- Digital Fusion
- Digital Healing
- Digital Mimicry
- Digital Regeneration
- Digital Teleportation
Variations
- Dark Data Manipulation
- Digital Magic
- Pixel Manipulation
- Psychic Data Manipulation
- Pure Data Manipulation
- Video Manipulation
Associations
- Artificial Element Manipulation
- Bionic Physiology
- Bio-Tech Manipulation
- Business Intuition
- Codification
- Computer Virus Physiology
- Cyber Mind
- Cyber Mode
- Cyber Transcendence
- Cyberspace Lordship
- Cyberspace Manipulation
- Data Conversion
- Data Warping
- Decodification
- Digital Weaponry
- Knowledge Manipulation
- Literary Manipulation
- Nanite Manipulation
- Omniscience
- Physical Information Manipulation
- Record Manipulation
- Replication
- Science Manipulation
- Technological Assimilation
- Technology Manipulation
- Video Manipulation
- Virtual Warping
Limitations
- Users may need to overcome multiple digital protections to access certain forms of data
- Users start off with limited knowledge and need to train, study and gather enough information before being able to fully master a new technique or skill
Known Users
- Sora Takeuchi (Air Gear); via Sky Regalia
- Nicole the Holo-Lynx (Archie's Sonic the Hedgehog)
- Grid (DC Comics)
- Nessa (Fractale)
- Vexen (Kingdom Hearts)
- Data-Riku (Kingdom Hearts)
- Data-Sora (Kingdom Hearts)
- Data-Roxas (Kingdom Hearts)
- Data-Namine (Kingdom Hearts)
- Bug Blox (Kingdom Hearts)
- Love Machine (Summer Wars)
- Programs (Tron)
- Cyber Elfs (Megaman Universe)
- Yuki Nagato (The Melancholy of Haruhi Suzumiya)
- Jeremy Belpois (Code Lyoko)
- Aelita Hopper-Shaffer (Code Lyoko)
- X.A.N.A. (Code Lyoko)
- Ultron (Marvel Comics)
- Eugene Sims (Infamous: Second Son)
- Delsin Rowe (Infamous: Second Son)
- Data Scanner (Valkyrie Crusade)
- Tecna (Winx Club)
- Alya Césaire/Lady Wifi (Miraculous: Tales of Ladybug and Cat Noir)
- Vincent Aza/Pixelator (Miraculous: Tales of Ladybug and Cat Noir)
- Sound Wave (Transformers Prime/Robots in Disguise/Revenge of the Fallen)
- Mister Majestic (WildStorm)
- Yasuho Hirose (JoJo's Bizzare Adventure part 8: JoJolion)
- Tom Harvey (IBOY)
- Circuit-Steam (Stretch Armstrong and the Flex Fighters)
- BB (Fate/Extra CCC)
- BG9 (Bleach)