To put it simply, there are far, far too many programs to learn in a natural way. This is because, in your timeline, Acts and Programs in the Matrix are separate from skills, but also depend on skills. So, enough of this. I cannot explain these to you easily without ripping apart the veil that separates your reality of pen and paper from mine of code. Below is a table of all the actions, what Complex Form they need, and what the roll is to use those skills. Any actions or Complex Forms with a link have too many details to be simplified in a table.
Below this table will be a list of the most to least important Complex Forms, based on how many skills need them. Additionally, this list will mark what Complex Forms are unnecessary. I do not use this term lightly. Unnecessary explicitly means that you can use a Commlink instead.
| Action | Time | Skill/Stats | Complex Form | Test Roll |
|---|---|---|---|---|
| Alter/Swap Icon | Free | System | - | - |
| Change Linked Device Mode | Free | System | - | - |
| Detect Active/Passive Wireless Nodes | Free | System | - | - |
| Jack Out | Free | System | - | - |
| Switch Interface Mode | Free | System | - | - |
| Terminate Data Transfer | Free | System | - | - |
| Transmit Phrase | Free | System | - | - |
| Analyze Icon/Node | Simple | Computer | Analyze | Computer + Analyze |
| Call/Dismiss Sprite | Simple | Compiling | - | - |
| Deactivate Program | Simple | System | - | - |
| Decrypt | Simple | System | - | - |
| Encrypt | Simple | Electronic Warfare | Encrypt | - |
| Issue Command | Simple | System | - | - |
| Jump In | Simple | System | - | - |
| Log Off | Simple | System | - | - |
| Observe In Detail | Simple | System | - | - |
| Transfer Data | Simple | System | - | - |
| Capture Wireless Signal | Complex | Electronic Warfare | Sniffer | E.Warfare + Sniffer (3) |
| Compile Sprite* | Complex | Compiling | - | - |
| Control Device | Complex | Object Dependant | Command | O.Dep + Command |
| Crash Node | Complex | Hacking | Exploit | Hacking + Exploit (Sys+Firewall; +4 after first Crash.Node) |
| Crash Program | Complex | Hacking | Exploit | Hacking + Exploit |
| Data Search* | Complex | - | - | - |
| Decompile a Sprite* | Complex | Decompiling | - | - |
| Detect Hidden Node (General) | Complex (1 Combat Turn per Roll) | Electronic Warfare | Scan | E. War + Scan (15+) |
| Detect Hidden Node (Specific) | Complex | Electronic Warfare | Scan | E. War + Scan (4) |
| Disarm Data Bomb | Complex | Hacking | Disarm | Hacking + Disarm |
| Edit | Complex | Computer | Edit | Computer + Edit |
| Hack on the Fly | Complex (Complex Action per Roll) | Hacking | Exploit | Hacking + Exploit (target Firewall) |
| Initiate Cryptanalysis | Complex (1 Combat Turn per Roll) | Electronic Warfare | Decrypt | E. War + Decrypt (Encrypt Rating x 2) |
| Intercept Traffic (Eavesdrop) | Complex | Hacking | Sniffer | Hack + Sniffer |
| Jam Signal* | Complex | - | - | - |
| Log On | Complex | - | - | - |
| Matrix Attack | Complex | Cybercombat | Atk, Blk.Hammer, or Blkout | C.Combat + [Atk] |
| Reboot | Complex (1 Combat Turn per Roll) | System, Response | - | Sys + Response (10) |
| Redirect Trace | Complex | Hacking | Spoof | Hacking + Spoof |
| Repair Icon | Complex (Complex Act per Roll) | Computer | Medic | Comp + Med (Damage x 2) |
| Run Program | Complex | - | - | - |
| Set Data Bomb | Complex | - | Data Bomb | - |
| Spoof Command | Complex | Hacking | Spoof | Hack + Spoof |
| Trace User | Complex (Complex Act per Roll) | Computer | Track | Comp + Track (10) |