Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Connect 4 on a General Board

You can try out the classical connect-4 game at:

http://www.mathisfun.com/games/connect4.html.

While the classical connect-4 game is played on a 67 board, it can in fact be played in any nrRowsnrCols board. In your implementation, the user will specify the number of rows nrRows and the number of columns nrCols. A win is obtained if a player has four consecutive pieces in a row, column, or diagonal.

Your program should implement the game for two human players. Extra credit, up to 20 points, will be given for the design of the graphical interface. You could enhance your graphics by using sounds as well.

For additional extra credit, up to 30 points, you could implement a computer-playing strategy. Extra credit points will be given based on the strength of the computer play.

Alternative Projects

As an alternative to connect-4, you could implement:

  • Sokoban, see http://www.game-sokoban.com/, http://en.wikipedia.org/wiki/Sokoban
  • Breakout, see http://www.play.vg/games/10-Breakout.html
  • Nine Men's Morris, see http://en.wikipedia.org/wiki/Nine Men's Morris
  • Mini-chess, see en.wikipedia.org/wiki/Minichess, the Gardner variant.
  • Backgammon, see http://en.wikipedia.org/wiki/Backgammon

In addition to the interface, the ability of the computer to play the game will be taken into consideration. There will be up to 20 points of extra credits for the graphical design and up to 30 points of extra credit for the strength of the computer play.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9257

Have any Question? 


Related Questions in Computer Engineering

1 the maximum window size of the tcp was originally

1. The maximum window size of the TCP was originally designed to be 64 KB (which means 64 × 1024 = 65,536 or actually 65,535). Can you think of a reason for this? 2. What is the maximum size of the TCP header? What is th ...

In sect 1013 we state that sender or message authentication

In Sect. 10.1.3 we state that sender (or message) authentication always implies data integrity. Why? Is the opposite true too, i.e., does data integrity imply sender authentication? Justify both answers. In this exercise ...

1 what is a virtual switching element2 why should a small

1. What is a virtual switching element? 2. Why should a small business opt to virtualize its computing resources? 3. In recent years, there has been a phenomenal growth in the business use of computing virtualization tec ...

Python provides a numeric class for working with

Python provides a numeric class for working with floating-point values. But not all real numbers can be represented precisely on a computer since they are stored as binary values. In applications where the precision of r ...

Commercial matching service scenariowwwbuycomputercom is a

Commercial Matching Service Scenario www.buycomputer.com is a fictitious website to match consumers who wish to purchase computers with businesses who are able to supply them. It works as follows: 1- Consumers can visit ...

1 some of the application programs can use the services of

1. Some of the application programs can use the services of two transport-layer protocols (UDP or TCP). When a packet arrives at the destination, how can the computer find which transport layer is involved? 2. A client r ...

This chapter covered network management whereas the

This chapter covered network management, whereas the previous chapter covered network security. Note that network design tasks are often interwoven, however, and shouldn't be considered discrete just because a book is di ...

1 assume we want to connect two isolated hosts together to

1. Assume we want to connect two isolated hosts together to let each host communicate with the other. Do we need a link-layer switch between the two? Explain. 2. If there is a single path between the source host and the ...

Consider an ethernet segment with propagation delay between

Consider an Ethernet segment with propagation delay between any two nodes at most 225 bit times. Assuming the smallest possible Ethernet frame to be 576 bits (which it is), can a host transmit a frame without detecting a ...

The 2-d array described in chapter 2 is a simple

The 2-D array described in Chapter 2 is a simple rectangular structure consisting of the same number of elements in each row. Other layouts are possible and sometimes required by problems in computer science. For example ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro