How the game was integrated with the concepts of computing

Assignment Help Basic Computer Science
Reference no: EM13328513

Playing with Games

Throughout this course, you will work individually and from the perspective of a computer scientist to recreate different games you will pick weekly.

This week you should select a gamefor whichthe win condition is solvable by a truth table. This means that there are a finite number of ways to win and the conditions for victory are either true or false. Using the criteria outlined below, identify the game and outline its rules and starting condition. Create the truth table for the victory condition using the material covered this week and your own research.
Games of all kinds are the result of a process that involves creativity, logic, and simple common sense. When it comes to games, we often do not pay much attention to the steps involved in or the time spent in their creation. This assignment will lead you through the thought process of recreating games with which you are familiar each week.

Each week, you will explore a new game through the lens set up by the weekly material. For example, when working with Turing machines, you may wish to represent the concept through a game of Hangman.

For each week, you will submit:

  • A brief explanation of the computing concepts to be modeled
  • A brief explanation of how the game would function if created by you
  • A brief explanation of the original game on which you have based your assignment if the game already exists
  • A brief explanation of how the game was integrated with the concepts of computing if the game already exists
  • Three scenarios of game play, including:
    • The setup of the game
    • The desired outcome
    • A sample game for each scenario

Your submission will be evaluated on the following criteria:

  • The adaptability of the game chosen to the week's topic
  • The extent to which the game and the computing concepts integrate
  • The quality of the work submitted by you
  • The completeness of each week's report

Reference no: EM13328513

Questions Cloud

How old will erika be when erika becomes a millionaire : Kitty invested in the New Issue Bio-Tech Fund, which invests in small, newly issued bio-tech stocks and whose investors have earned an average of 16% per year in the fund's relatively short history.
Explain using sulfuric acid instead of hydrochloric acid : Would using sulfuric acid instead of hydrochloric acid with zinc metal change the outcome of the reaction
Define ground-state electron configurations : write ground-state electron configurations for these ions, which play important roles in biochemical processes in our bodies. (Use a noble gas core abbreviation) Na^+, Mg^2+ Cl^- K^+
How far does the book slide before it has zero speed : The 3.90kg physics book shown is connected by a string to a 474.0g coffee cup. How far does the book slide before it has zero speed
How the game was integrated with the concepts of computing : Each week, you will explore a new game through the lens set up by the weekly material. For example, when working with Turing machines, you may wish to represent the concept through a game of Hangman.
Describe how many orbitals are in a atom : How many orbitals are there in a atom with the following combinations of quantum numbers? A). n=3 l=1 B). n=4 l=2 ml=2
How to balance the equations : Balance the following equations. (Use the lowest possible whole-number coefficients. These may be zero.) (a) ClO3-aq) + As(s) Æ HClO(aq) + H3AsO3(aq) ClO3
What is scotts acceleration : Scott is rolling down a 30° slope on his skateboard. The total mass of Scott and the skateboard is 75 kg. What is Scott's acceleration
Explain an atom of a certain element has 20 electrons : an atom of a certain element has 20 electrons write the ground state configuration of the element

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Difference between cyber crimes and cyber-related crimes.

Summarize the difference between cyber crimes and cyber-related crimes. On cyber crimes, define cyber trespass, cyber privacy and cyber vandalism. On cyber-related crimes explain the difference between cyber-assisted and cyber-enhanced crimes.

  Write a program that generates a random integer

Write a program that generates a random integer in the (inclusive) range [0-9] (i.e. the set {0,1,2,3,4,5,6,7,8,9}) and ask the user to guess what the number is.

  Write a python programs to solve the following

Write a Python programs to solve the following 1. An electronics company sells circuit boards that cost $21.99. Assume tax is 9%. Print the total price of 3 circuit boards.

  An iterative algorithm to traverse an arbitrary number

An iterative algorithm to traverse an arbitrary number of nested subdirectories in a file system.

  Create a function in vb and matlab fncdaysinmonth

define in VB: an array of months; in Matlab: a vector matrix of months, containing the number of days in each month.

  Determine each root with a maximum absolute error

Determine each root with a maximum absolute error max and print the intermediate results. (b) Use Matlab's zero function to solve the equations from (a) with a high precision. Compare the results.

  Privacy and security issues are inherent in data storage

Privacy and security issues are inherent in data storage. Let's consider the question of who owns the data about a particular person: medical, credit, personal, financial, consumer information, etc.?

  How many instructions can the processor execute

Assume that we are working on a workstation with an instruction rate of 500 MIPS. How many instructions can the processor execute between the receipt of each individual bit of the message?

  Create a visual basic program that creates a bill

Create a Visual Basic program that creates a bill for an automobile repair shop. The shop bills customers at the rate of $35 per hour for labor. Parts and supplies are subject to a 5% sales tax.

  Create method that prints a rectangle of characters console

Create a method that prints a rectangle of characters to the console. The method should use a character set that parameter to the method.

  Explain remote batch-processing operation

A band is always equal to? In signal power as light travels down fiber is called. what does remote batch-processing operation in which data is only input to central computer would need?

  An msp430-based system interfaces 4 external devices

An MSP430-based system interfaces 4 external devices (ED0, ED1, ED2, ED3), each capable of generating an interrupt request.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd