Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Connect 4 on a General Board

You can try out the classical connect-4 game at:

http://www.mathisfun.com/games/connect4.html.

While the classical connect-4 game is played on a 67 board, it can in fact be played in any nrRowsnrCols board. In your implementation, the user will specify the number of rows nrRows and the number of columns nrCols. A win is obtained if a player has four consecutive pieces in a row, column, or diagonal.

Your program should implement the game for two human players. Extra credit, up to 20 points, will be given for the design of the graphical interface. You could enhance your graphics by using sounds as well.

For additional extra credit, up to 30 points, you could implement a computer-playing strategy. Extra credit points will be given based on the strength of the computer play.

Alternative Projects

As an alternative to connect-4, you could implement:

  • Sokoban, see http://www.game-sokoban.com/, http://en.wikipedia.org/wiki/Sokoban
  • Breakout, see http://www.play.vg/games/10-Breakout.html
  • Nine Men's Morris, see http://en.wikipedia.org/wiki/Nine Men's Morris
  • Mini-chess, see en.wikipedia.org/wiki/Minichess, the Gardner variant.
  • Backgammon, see http://en.wikipedia.org/wiki/Backgammon

In addition to the interface, the ability of the computer to play the game will be taken into consideration. There will be up to 20 points of extra credits for the graphical design and up to 30 points of extra credit for the strength of the computer play.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9257

Have any Question? 


Related Questions in Computer Engineering

Keeping the iv secret in ofb mode does not make an

Keeping the IV secret in OFB mode does not make an exhaustive key search more complex. Describe how we can perform a brute-force attack with unknown IV. What are the requirements regarding plaintext and ciphertext  Descr ...

Research the internet to determine if there are any ddbmss

Research the internet to determine if there are any DDBMSs that follow all 12 rules. Explain on examples.

1 when we say that the transport layer multiplexes and

1. When we say that the transport layer multiplexes and demultiplexes applicationlayer messages, do we mean that a transport-layer protocol can combine several messages from the application layer in one packet? Explain. ...

1 what is a vulnerability what do you understand by a

1. What is a vulnerability? What do you understand by a system vulnerability? 2. Discuss four sources of system vulnerabilities. 3. What are the best ways to identify system vulnerabilities? 4. What is innovative misuse? ...

Do a complete research and reading in order to understand

Do a complete research and reading in order to understand how multimegawatt induction generators can be controlled with a scalar control. Assume power electronic devices capable of handling high voltages and high current ...

Develop an algorithm that uses a random number generator

Develop an algorithm that uses a random number generator which always generates random numbers in the range lower. . . . upper. In each instance the random number generated should take on the role of middle in the above ...

1 assume we design a new client-server application program

1. Assume we design a new client-server application program that requires persistent connection. Can we use UDP as the underlying transport-layer protocol for this new application? 2. How is an IP address represented in ...

We consider the long-term security of the advanced

We consider the long-term security of the Advanced Encryption Standard (AES) with a key length of 128-bit with respect to exhaustive key-search attacks. AES is perhaps the most widely used symmetric cipher at this time. ...

1 list and describe four vulnerability intelligence sources

1. List and describe four vulnerability intelligence sources. Of those that you listed, which seems the most effective? Why? 2. What does CERT stand for? Is there more than one CERT? What is the purpose of a CERT?

You are to design a visual system for detecting small black

You are to design a visual system for detecting small black objects against a tight background. Assume that the image of one of these objects is a square that is 5 pixels wide. Your system is to be used to create a Boole ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen