Flylib.com
Game Programming for Teens
Game Programming for Teens
ISBN: 1598635182
EAN: 2147483647
Year: 2004
Pages: 94
Authors:
Maneesh Sethi
BUY ON AMAZON
Main page
Table of contents
Dedication
Acknowledgments
About the Author
Letter from the Series Editor
Introduction
What s in the book?
Who Are You?
Who am I?
Conventions Used in this Book
Let s Get Ready to Rumble
Part ONE: The Basics of BASIC
Chapter 1. Getting Started
A Brief History of BASIC
The First Game: KONG
Summary
Chapter 2. Getting to Know BASIC
Hello, World
Variables
Input
Conditionals
Logical Operators
The Goto Command
A Text-Based Guessing Game
Summary
Chapter 3. Loops, Functions, Arrays, and Types
Loops
Functions
Arrays
Types
Putting It All Together: Textanoid
Summary
Chapter 4. The Style Factor
Developing Style
Comments
Function and Variable Names
Summary
Part TWO: Getting Graphical
Chapter 5. Beginning Graphics
Creating the Graphics Window
Images
Colors
Summary
Chapter 6. Page Flipping and Pixel Plotting
Page Flipping
Locking and Unlocking Buffers
Using Buffers: A Paint Program
Summary
Chapter 7. Basic Image Programming
Transformations
Parallaxing
Summary
Chapter 8. Animation
Using Bitmaps in Animation
Summary
Chapter 9. Collision Detection
Basic Collisions
Bounding Circles
Bounding Boxes
Pixel-Imperfect Collisions
Pixel-Perfect Collisions
Summary
Part THREE: Completing the Puzzle
Chapter 10. Handling Input
Handling the Keyboard
Mapping the Mouse to the Screen
Joystick Input
Summary
Chapter 11. Sounds and Music
Sound
Music
Summary
Chapter 12. Artificial Intelligence
Random Numbers
Chasing and Evading
Summary
Chapter 13. The Final Frontier: Invaderz
Let s Bust It: Planning the Game
Constants, Functions, and Types in Invaderz
Playing Invaderz
Conclusion
Part FOUR: APPENDIXES
Appendix A. SCAN CODE REFERENCE
Appendix B. Useful Links
Blitz Basic Links
General Game Programming Links
Appendix C. What s on the CD
Source
Art
Sounds
Games
Programs
Game Programming for Teens
ISBN: 1598635182
EAN: 2147483647
Year: 2004
Pages: 94
Authors:
Maneesh Sethi
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 4.1 Authentication with Public Keys
Step 4.5 How to use OpenSSH Passphrase Agents
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 5.1 General Troubleshooting
Cisco IOS Cookbook (Cookbooks (OReilly))
Keeping Statistics on Routing Table Changes
Configuring RIP Version 1
Manual RSVP Reservations
Classical IP Over ATM
OpenSSH
Data Structures and Algorithms in Java
Classes and Objects
Projects
Best, Worst, and Average Case
Sets
C.1. Sum Notation
MySQL Cookbook
Using a FULLTEXT Search with Short Words
Forcing MySQL to Treat Strings as Temporal Values
Using AUTO_INCREMENT Valuesto Relate Tables
Inserting Records in One Table That Include Values from Another
Collecting Web Input
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 14. Control Your Bluetooth Phone with FMA
Hack 29. Detect Networks with Kismet
Hack 53. Do-It-Yourself Access Point Hardware
Hack 69. Extend Your Wireless Network with WDS
Section A.8. CDPD, 1xRTT, and GPRS: Cellular Data Networks
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Whos Using Quartz?
Running the Quartz Cluster Nodes
Configuring the Quartz ThreadPool
Configuring Quartz Listeners
Configuring Quartz Datasources
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies