subject

Please help ive been working on this for a couple weeks Now, it’s time for you to begin coding your text-based adventure game!

Starting at the top, convert each line of your pseudocode from your Coding Log into a line of Python code.
Make sure to use the correct syntax and indentation. If you decide to challenge yourself and use functions, be sure to include the correct function calls.
Your code should include at least two loops—one while loop and one for loop.
Run and test your code in parts as you go. Follow the iterative process of coding and revising. It may be helpful to apply this process to each part of your game (Intro, Part 1, Part 2, and Part 3).
Make the following improvements to your game:
If the user types in a slightly different word than you expect, you don’t want your game to crash! Use lists to gain a better understanding of the input that users give. Refer back to Unit 1 for more information on lists. Here is an example:
if choice in [“set a trap”, “set trap”, “trap”, “make a trap”, “make trap”]
Your list won’t work if the user capitalizes any letter because the Interpreter won’t recognize a match between the same lowercase and uppercase letter. To convert the user input to all lowercase, use the lower function:
if choice. lower() in [“set a trap”, “set trap”, “trap”, “make a trap”, “make trap”]

Go through and make sure all of your inputs are converted to lowercase.
Share the link to your Python code with your teacher in REPL. it by clicking on the share button and copying the link. Also, submit your pseudocode.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:20
Write a program that reads a file consisting of students’ test scores in the range 0–200. it should then determine the number of students having scores in each of the following ranges: 0–24, 25–49, 50–74, 75–99, 100–124, 125–149, 150–174, and 175–200. output the score ranges and the number of students. (run your program with the following input data: 76, 89, 150, 135, 200, 76, 12, 100, 150, 28, 178, 189, 167, 200, 175, 150, 87, 99, 129, 149, 176, 200, 87, 35, 157, 189.)
Answers: 3
question
Computers and Technology, 22.06.2019 23:30
Select all that apply. which of the following are proofreading options included in microsoft word? spell check find replace grammar check formatting check
Answers: 1
question
Computers and Technology, 24.06.2019 16:00
Your is an example of personal information that you should keep private.
Answers: 2
question
Computers and Technology, 24.06.2019 16:30
What is the item which could be matched with a statement below? software installed on a computer that produces pop-up ads using your browser an example of social engineering malware loads itself before the os boot is complete type of spyware that tracks your keystrokes, including passwords windows key + l the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer when someone who is unauthorized follows the employee through a secured entrance to a room or building a type of malware that tricks you into opening it by substituting itself for a legitimate program a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Answers: 1
You know the right answer?
Please help ive been working on this for a couple weeks Now, it’s time for you to begin coding your...
Questions
Questions on the website: 13722362