Examples of using Anomalous objects in English and their translations into Ukrainian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Most of the anomalous objects possessed by the Insurgency are unknown.
Members come from a number of countries,and have access to a wide variety of anomalous objects.
Are capable of either obtaining or producing anomalous objects and entities, and using them to create art installations.
The Civilian has occasionallysent requests to the Foundation regarding the purchase of anomalous objects;
According to the authors, an anomalous objects named G1-G6, look like elongated blobs of gas several times more massive than Earth.
Despite its name,the group has not limited itself to the pursuit of anomalous objects of Islamic origin.
According to the authors, the discovered anomalous objects, called G1-G6, look like oblong gas clots several times more massive than the Earth.
The scholars of the organization followed thedescriptions that were shown on the scroll to contain the anomalous objects they discovered.
Although they have occasionally used anomalous objects in secret, members of The Civilian generally seek to destroy anomalies or counteract their effects.
Classifications are assigned topersonnel based on their proximity to potentially dangerous anomalous objects, entities, or phenomena.
Anomalous objects that are related to the Kuiyang Sect are usually anomalous areas, buildings/structures, literature and tools pertaining to Chinese alchemy.
As a result of the Association's widespread influence,members have access to a wide variety of magical techniques and anomalous objects.
Overview: Founded in 1892,Prometheus Labs was dedicated to researching anomalous objects for use in developing new technologies.
All anomalous objects, entities, and phenomena requiring Special Containment Procedures are assigned an Object Class for purposes of research priority, budgeting, and other considerations.
A Class personnel rarely have direct interactions with AEPs andare often forbidden to interact with anomalous objects altogether.
There are many other groups in existence who possess, use,or attempt to create anomalous objects, either for their own personal gain or for the protection of mankind.
They are normally only used in their actual purpose, against ground and air vehicles of hostile groups of interest,and only rarely against anomalous objects and entities.
Special Containment Procedures: SCP-2779 is to be kept with other low-level anomalous objects in the Area-12 Parazoology Department pens.
It is currently assumed that the members of Galactic Federation are to a certain extent capable of linking together through a hive-mind consciousness,and can unconsciously create a series of deceptive memetic anomalous objects.
Similar to[DATA EXPUNGED],the Abnormality Institute kept a catalog which listed in detail all anomalous objects located in China in the form of a bamboo scroll.
Level 3 security clearances are given to senior security and research personnel that require in-depth data regarding the source, recovery circumstances,and long-term planning for anomalous objects and entities in containment.
Some of these disputes center around philosophical differences, such as the weaponization of anomalous objects, while others appear to be personal in nature.
Level 3 security clearances are given to senior security and research personnel that require in-depth data regarding the source, recovery circumstances,and long-term planning for anomalous objects and entities in containment.
Firstly, containment teams are called upon to respond to confirmed cases of anomalous activity to secure andestablish initial containment over anomalous objects, entities, or phenomena and transport them to the nearest Foundation containment site.
Overview: Information about the Oneiroi Collective has come to the Foundation only through analysis andinterviews or the anomalous objects they leave behind.
Level 0 security clearances are given to non-essentialpersonnel with no need to access information regarding anomalous objects or entities in Foundation containment.
The Foundation refused, and members of this group have continued to attack Foundation personnel andattempt to steal anomalous objects in Foundation containment.
Level 2 security clearances are given to security andresearch personnel that require direct access to information regarding anomalous objects and entities in containment.
Due to the sensitivity of their positions,O5 Council members must not come into direct contact with any anomalous object, entity, or phenomenon.
The rock is natural quartz and feldspar granite, and such rocks to not form, according to geology, in a matter of decades,which is what would be required if the anomalous object were made by modern man.