Choose a single game to analyze. Have the students create and describe their own list of verbs, objects, and other rules that create this game's structure and experience, including their own description of how the verb, object, or rule operates. Other rules besides verbs and objects might involve how certain verbs or objects interact or how the game is won or lost. After everyone is finished,

discuss similarities and differences in how each student described the game.

What will be an ideal response?


Divide the class into groups, and have each group choose a game that at least two members of the group are familiar with, either from a list of games you've already discussed, or by brainstorming. Have each group identify the most important verbs in the game, and then redesign the core gameplay by substituting a different verb. What would happen if we replaced the verb "shoot" in a game about shooting with a different verb like "talk" or "dance?" A game where "jump" is a primary verb might be redesigned to be about a verb like "glide" instead. How would the game's rules, behavior, and interaction have to change to make it feel like a game about gliding instead of jumping? What would this change mean for other aspects of the game? Would the spaces of the game end up having to change? How about the game's narrative themes and story?

Groups should describe the redesigned version of their game in detail—more or less detail depending on available time. Have groups present their redesigned game to the class, and take questions and feedback from members of other groups.

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about saving your presentation in the PowerPoint Picture Presentation format?

A) It flattens all slide objects into one layer. B) The file size is smaller. C) It is easier for others to modify. D) It is harder for others to modify.

Computer Science & Information Technology

Which of the following is a type of agreement issued by an administrative agency in which the defendant agrees to stop the alleged illegal activity without admitting fault?

A. Subpoena B. Judgment C. Consent decree D. National security letter

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 5-1Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. All the computers in Janet's school computer lab have the latest version of Windows installed, which is ____.

A. Windows Vista B. Windows 8 C. Windows XP D. Windows 10

Computer Science & Information Technology

Candidate keys that are not used for the primary keys are ________ keys

A) artificial B) natural C) alternate D) composite

Computer Science & Information Technology