Does your game lend itself to be categorized as a “social” game? If not, what are some social elements that could be incorporated to help raise visibility for your game?

What will be an ideal response?


If this chapter is being used in a course focusing on social game development, each student’s game should be categorized as a “social” game. In this case, each student should provide a game description and discuss why their games should be categorized as “social.” If this chapter is not being used in a course focusing on social game development, each student should determine whether or not their games are “social” – and if not, they should delineate which social elements could be incorporated to help raise visibility for their games. Social elements discussed in the chapter include: asynchronous gameplay, community, endless play, virtual currency, reciprocity, drop in/drop out, buyouts, and advertising.

Computer Science & Information Technology

You might also like to view...

Write a program that allows students to schedule appointments at either 1, 2, 3, 4, 5, or 6 o’clock p. m. Use an array of six strings to store the names for the time slots. Write a loop that iterates as long as the array has a free space. Within a try block, allow the user to enter a time and a name. If the time is free, put the name in the array. If the time is not free, throw a TimeInUseException. If the time is not valid, throw an InvalidTimeException. Use a catch block for each different kind of exception.

What will be an ideal response?

Computer Science & Information Technology

A(n) _________ is inserted to divide a document into multiple sections.? A. section window B. section tag C. section break D. section title

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Strictly speaking, the rules of JavaScript syntax require a semicolon at the end of each line.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ISO 27005 Standard for InfoSec Risk Management has a five-stage management methodology that includes risk treatment and risk communication.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology