Publisher | Marvel Comics |
---|---|
Debut | The X-Men #1 (Sept. 1963) |
Creators | Stan Lee Jack Kirby |
Type | Training room |
Room | y |
Subcat | Marvel Comics |
Sortkey | Danger Room }} |
After befriending the Shi'ar the X-Men rebuilt the Danger Room with Shi'ar hard-light holographic technology. These upgrades were largely added by Dr. Hank McCoy (Beast). The Danger Room is located in the X-Mansion; every destruction of the latter led to a rebuilding, and usually upgrading, of the Danger Room. The training facility has endured extensive damage over the years, usually from X-Men training or X-Men going rogue, as Colossus did during The Muir Island Saga. Supervillains have dealt critical damage to it as well as taking over the facility, especially Arcade. The security and safety protocols that ensure the safety of anyone using the Danger Room have frequently been disrupted, tampered with by villains, failed, or have been completely negated in all the years of its use, each time happening more frequently as the room began to get more and more upgraded.
It is suggested in the X-Men Official Guide that the objects in the danger room are holograms surrounded by force fields, supposedly confirmed in Astonishing X-Men when a student managed to kill himself by jumping from a holographic cliff face. It is also revealed that the Danger Room can display holograms in only 32-bit color.
Xavier was revealed to have known of the Danger Room's sentience and chosen not to reveal it, much to the dismay of the X-Men who seem to view this deception as a taking on one of Magneto's former ideals. During the battle on Genosha, she takes control of Cassandra Nova's second Wild Sentinel and engages Beast in a vicious and brutal fight while the other X-Men take on the Wild Sentinel. After Beast destroys her body, "Danger's" consciousness was presumed to still exist within the conflicted consciousness of the Wild Sentinel.
Danger and Ord both ended up on Breakworld, along with the X-Men and S.W.O.R.D., and after the robot encountered Emma Frost and an unconscious Cyclops, Emma told the robot that despite its supposed enmity it has let the mutants live too often, meaning it hasn't overcome its parent programming, so it cannot kill any mutant. Cyclops recovers, and Emma tells Danger to help the X-Men in Breakworld, and in exchange, it will be given Professor Xavier. Danger later attacks some of Breakworld's inhabitants and sides with the X-Men and S.W.O.R.D.
After being damaged by the crew, she warps the entire area with her holographic projections of past moments within Rogue's life as well as other famous moments from the X-Men's history. Xavier confronts Danger and she reveals she intended to make Rogue absorb all his powers and memories permanently, leaving him crippled and useless. Xavier reveals that when she first said Where am I?, he consulted her Shi'ar makers who assured him it was not possible she could have gained self-awareness and that he had no way of knowing what she was or would become. He tried to free her but because she was really billions of lines of machine code, he didn't know which lines to erase without lobotomizing her. Because of not knowing what she was capable of, if he had freed her, she might have killed his X-Men because she had the knowledge and power, so instead he did nothing and watched her suffer. Xavier ends her suffering by repairing her. She then sides with Xavier, Rogue and Gambit and takes out the Shi'ar salvage crew. Afterwards, with Xavier she helps Rogue gain full control over her powers.
After the events of Utopia, Danger is seen being repaired by Madison Jeffries when they are attacked by Emplate. Danger tries to defend Madison only to be further damaged by Emplate. After being repaired, at the request of Cyclops, she informs the inhabitants of Utopia who Emplate is and his history. She works alongside Madison, Rogue and the X-Club on erasing Legion's many personalities, and is offered the position of warden of Utopia by Emma Frost, which she accepts because it also allows her to study the best and the worst of what humanity has to offer. Danger's first job was to interrogate Scalphunter, who was forced into bringing five Predator Xs to Utopia.
The Danger Cave is similar to the Danger Room, but what makes the Danger Cave unique is that it uses holograms to train the students by re-enacting renowned battles the X-Men were involved in, like Inferno, Broodworld, Planet X, or Onslaught, even going so far as to dress the participants up in what the X-Men wore at that time.
Category:Fictional technology Category:Marvel Comics supervillains Category:Virtual reality in fiction Category:X-Men Category:Holography in fiction
es:Sala de Peligro fr:Salle des dangers pt:Sala de PerigoThis text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
The World News (WN) Network, has created this privacy statement in order to demonstrate our firm commitment to user privacy. The following discloses our information gathering and dissemination practices for wn.com, as well as e-mail newsletters.
We do not collect personally identifiable information about you, except when you provide it to us. For example, if you submit an inquiry to us or sign up for our newsletter, you may be asked to provide certain information such as your contact details (name, e-mail address, mailing address, etc.).
When you submit your personally identifiable information through wn.com, you are giving your consent to the collection, use and disclosure of your personal information as set forth in this Privacy Policy. If you would prefer that we not collect any personally identifiable information from you, please do not provide us with any such information. We will not sell or rent your personally identifiable information to third parties without your consent, except as otherwise disclosed in this Privacy Policy.
Except as otherwise disclosed in this Privacy Policy, we will use the information you provide us only for the purpose of responding to your inquiry or in connection with the service for which you provided such information. We may forward your contact information and inquiry to our affiliates and other divisions of our company that we feel can best address your inquiry or provide you with the requested service. We may also use the information you provide in aggregate form for internal business purposes, such as generating statistics and developing marketing plans. We may share or transfer such non-personally identifiable information with or to our affiliates, licensees, agents and partners.
We may retain other companies and individuals to perform functions on our behalf. Such third parties may be provided with access to personally identifiable information needed to perform their functions, but may not use such information for any other purpose.
In addition, we may disclose any information, including personally identifiable information, we deem necessary, in our sole discretion, to comply with any applicable law, regulation, legal proceeding or governmental request.
We do not want you to receive unwanted e-mail from us. We try to make it easy to opt-out of any service you have asked to receive. If you sign-up to our e-mail newsletters we do not sell, exchange or give your e-mail address to a third party.
E-mail addresses are collected via the wn.com web site. Users have to physically opt-in to receive the wn.com newsletter and a verification e-mail is sent. wn.com is clearly and conspicuously named at the point of
collection.If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by following the instructions included in each newsletter or communication or by e-mailing us at michaelw(at)wn.com
The security of your personal information is important to us. We follow generally accepted industry standards to protect the personal information submitted to us, both during registration and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100 percent secure, however. Therefore, though we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
If we decide to change our e-mail practices, we will post those changes to this privacy statement, the homepage, and other places we think appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.
If we make material changes to our e-mail practices, we will notify you here, by e-mail, and by means of a notice on our home page.
The advertising banners and other forms of advertising appearing on this Web site are sometimes delivered to you, on our behalf, by a third party. In the course of serving advertisements to this site, the third party may place or recognize a unique cookie on your browser. For more information on cookies, you can visit www.cookiecentral.com.
As we continue to develop our business, we might sell certain aspects of our entities or assets. In such transactions, user information, including personally identifiable information, generally is one of the transferred business assets, and by submitting your personal information on Wn.com you agree that your data may be transferred to such parties in these circumstances.