| 100% | ERASE | 5 | Clean, as a computer disk |
| 74% | ERASED | 6 | Cleaned, as a disk |
| 58% | BOOT | 4 | Start, as a computer |
| 58% | BOOTUP | 6 | Start, as a computer |
| 58% | USES | 4 | Operates, as a computer |
| 58% | CRASHED | 7 | Froze, as a computer |
| 58% | INOPERATIVE | 11 | DOWN, as a computer |
| 58% | RERAN | 5 | Checked, as a computer program |
| 58% | RESCAN | 6 | Correct, as a computer image |
| 58% | DEBUG | 5 | Fix, as a computer program |
| 58% | UPLOAD | 6 | Transfer, as a computer file |
| 58% | HACK | 4 | Break into, as a computer |
| 58% | CONFIGURE | 9 | Assemble, as a computer system |
| 58% | HACKS | 5 | Accesses illegally, as a computer |
| 58% | ERASABLE | 8 | Unlocked, as a computer file |
| 58% | FATAL | 5 | Unrecoverable, as a computer error |
| 58% | ZIP | 3 | Compress, as a computer file |
| 58% | HACKS | 5 | Breaks into, as a computer |
| 58% | HACK | 4 | Access illegally, as a computer |
| 58% | UNZIP | 5 | Decompress, as a computer file |
| 58% | UNDO | 4 | Reverse, as a computer operation |
| 58% | ERASE | 5 | Wipe, as a computer drive |
| 58% | RAN | 3 | Executed, as a computer program |
| 58% | HACKED | 6 | Broke into, as a computer |
| 58% | OTNIGOL | 7 | Access, as a computer network |
| 58% | BOOT | 4 | Start (up), as a computer |
| 58% | OPEN | 4 | Access, as a computer program |
| 58% | CRASH | 5 | Go down, as a computer |
| 58% | BOOT | 4 | Start up, as a computer |
| 58% | ABORTS | 6 | Stops, as a computer process |