Browse Definitions :
Definition

role-playing game (RPG)

A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.

Games like Dungeons and Dragons, Battletech and Star Wars were all popular examples of the genre of early online role playing games.

The online environments known as MUD and MOO included software for playing and developing role-playing games in text-based environments, often using ASCII maps and menus.

MUDs and MOOS evolved into Massive Multiplayer Online Role-Playing Games (MMPORGs), where users play a version of a game that includes access to a persistent world online through the game's interface.

Ultima Online and Neverwinter Nights were popular early in the development of MMPORGs. Everquest's much improved graphic engine drew even more players. World of Warcraft, an extremely popular MMPORG created by Blizzard software, now boasts over 6 million subscribers. Millions of players are involved in other games as well, especially in South Korea, where these games have proved especially popular, due in part to the high rate of broadband adoption in that country.

RPG also stands for Report Program Generator.

This was last updated in March 2011

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • network disaster recovery plan

    A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of ...

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close