Massively multiplayer online role-playing games

Assignment Help Basic Computer Science
Reference no: EM132348870

Assignment : Massively Multiplayer Online Role-Playing Games (MMORPGs)

In a virtual world (VW) of massively multiplayer online role-playing games (MMORPGs), collaboration and communication are provided through the Internet between MMORPG-ready devices such as the Microsoft Xbox, and Sony PlayStation, and by using the Web browser. Gamers around the world can play against other gamers without seeing their opponent face-to-face. The Internet and MMORPG devices have become a social phenomenon. For example, a mobile game, called "Game of War" enables players to play against each other anywhere around the world. Other diversions include Second Life which isn't really a game at all, but rather just that, another life people can live online through their online persona. 

Before you begin this assignment, engage in an online game or experience such as Game of War, Second Life, or Words with Friends, which has a phone app you can download free or play from your computer on the internet or even as a Facebook app. Any game where you are playing against a live person over the web. If you have difficulty finding an online multiplayer game, reach out to your instructor for guidance.

Write a paper with screen shots from your experience in which you complete the items below. Be sure to include what your choice was in the introduction paragraph.

1. Describe cognitive social phenomena that occur specifically to the context of the MMORPG that wouldn't happen in a face-to-face checkers game.

2. Compare and contrast the MMORPG user interaction environment to the face-to-face environment where a board game like Scrabble is being played. Next, identify whether or not the environment has an impact on the player's ability to play Words With Friends in an online environment.

3. Outline and describe the user interface requirements that a game designer needs to include in order to engage players in a MMORPG environment.

4. Use at least (3) quality resources in this assignment. NOTE:Wikipedia and similar Websites do not qualify as quality resources

5. Format your assignment according to the following formatting requirements:

a. This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details.

b. Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

c. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page is not included in the required page length.

d. Include a reference page. Citations and references must follow SWS format. The reference page is not included in the required page length.

NOTE: Although there is not a specific page length, you should fully explore and answer the questions asked. Typically you'll have two or three paragraphs with your main point supported by a few sentences of fact for each. The goal is to convince the reader that you have done your assigned reading and the additional research being asked. 100% original work is required.

Reference no: EM132348870

Questions Cloud

Enterprise risk management after performing analysis : How can computer engineers educate decision makers on the results of enterprise risk management after performing an analysis?
Efficient frontier analysis to evaluate risks of portfolio : Assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25
Demonstrate connection to your current work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
Computer incident response team plan : What tools, applications, laptops, and communication devices were needed to address the Computer Incident Response for this specific breach?
Massively multiplayer online role-playing games : CIS 375-Compare and contrast the MMORPG user interaction environment to the face-to-face environment where a board game like Scrabble is being played.
Effectiveness of incorporating real-world experience : Enterprise Risk Managment- Determine the effectiveness of incorporating real-world experience into our academic curriculum.
What was the name of the first computer network : What was the name of the first computer network? How did the implementation of TCP/IP revolutionize communication technology?
Ase study in creating value from uncertainty : How high do you assess the knowledge level of the business strategy throughout the company by the average employee?
Explain relevant economic and environmental data : Explain relevant economic and environmental data that support your proposal and analysis.Communicate your economic proposal in a logically structured

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd