Find an example of a game with an authored story that has a definite ending, where the story associated with the game resolves and closes. Write a new ending for this game, either one that alters the events of the existing ending or goes past it, describing what happens moments or years after the official ending. Describe how this extension to the story would be supported with gameplay. As a

continuation or change to the ending, would you introduce new verbs or objects? Talk about how you might use exploratory elements or story choices to support your new ending. Finally, evaluate your own new ending compared to the "official ending." If the ending you created became part of the official canon of this game's authored story, would it improve the game and players' experience of playing it? What are the pros and cons for your story becoming official?

What will be an ideal response?


Commentate on a sporting event or a match between players. You may do this with a recording of a physical sporting event, a competition involving esports (League of Legends, Starcraft) or fighting games (Street Fighter IV), or even a live match-up between two of your classmates. Practice doing your own commentary beforehand, and consider that part of your role as commentator is to dramatize the emergent story of the game, interpreting it and making it into an even more exciting story for other people observing the game. As your final deliverable for this project, record your own commentary alongside an existing or new visual recording of the game.

Computer Science & Information Technology

You might also like to view...

In addition to the relation between the subproblems of a problem, what else does a structure chart show?

What will be an ideal response?

Computer Science & Information Technology

The ________ is a model of Arduino for first-time Makers

A) LilyPad B) Uno C) Makey-Makey D) Fio

Computer Science & Information Technology

When you export a table from Access, the table must be closed for the export to complete

Indicate whether the statement is true or false

Computer Science & Information Technology

Exposing employee and customer personal data to an untrusted environment is an example of:

a. data spam. b. data phishing. c. data adware. d. data breach.

Computer Science & Information Technology