subject

Text Questions Please complete the following questions. It is important that you use complete sentences and present the questions and answers when you submit your work.

How do you make sure your ideas are original and not copied directly from other video games? Explain.
Explain how the four game mechanics mentioned in the unit (reward, risk/loss, levels, and feedback) could work together to create an interesting sports video game.
You’ve learned that video games use rewards to keep players coming back for more. Can you think of an example in real life that uses rewards to keep people coming back for more? How is this similar to video game rewards? Explain.
The unit says this about levels: “As the levels get harder, the environment might also change, the music might get more intense, and the colors might change shades for a completely different mood.”
Imagine that you are working on a game, and with each level that they progress to, the player encounters a greater risk to their health and life. How would you alter the music, colors, and other aspects of the environment to reflect this risk? Describe and explain. Why do you feel these environment choices and changes reflect increasing risk?
When designing a video game, it is important to make sure that the game offers a balance of risk and reward to keep your players challenged but not frustrate them so much that they do not want to continue playing. How would you assess and test your game before completing it to ensure that you had the right balance of risk/reward? Is there any way to know that you have achieved that balance for every player?

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:20, Masielovebug
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
image
Computers and Technology, 22.06.2019 09:40, vanessacasillas452
In the lab, which of the following displayed a list of all installed services and included a description of the service, the current state, and whether the service started automatically or manually? a. the services manager b. the applications summary c. the recommended services d. list the safe services list
Answers: 2
image
Computers and Technology, 22.06.2019 10:30, hope564
Dave has to create animations for a game. which tool can dave use?
Answers: 3
image
Computers and Technology, 23.06.2019 16:30, jessisjawsome
If i wanted to include a built-in calendar in a document, what option could i select? draw table insert table insert chart quick tables
Answers: 1
You know the right answer?
Text Questions Please complete the following questions. It is important that you use complete sente...

Questions in other subjects: