Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

vector card project

instruction are on the vectored card pdf and the card to use is attached as well

Vectored Game Card Project

Gimp (free) is one of the most popular open source photo/raster image editors. Also, Inkscape

is one of the few (free) alternative vector graphic applications. For all your graphic needs in this

course, you may use the editor of your choice; but, all instructions for this project will be based

on Gimp and Inkscape. If you use another graphic editor, the instructions do not

translate/correspond.

Go to Gimp and Inkscape websites and download the appropriate software for your computer.

One of the first things that you must learn when working with graphic media-specific software

is the choice of software. You must gain an understanding of raster versus vector. Photoshop

and Corel Paintshop are primary raster (pixel) image editors. The focus is on small little

squares. Illustrator, Fireworks, Inkscape, and Corel Draw are primarily vector-based

(mathematical) applications. They focus on the math of the line just as you learned in graphing

Ax + By = C in your math courses. Gimp (free) is more of a raster editor than a vector media-

specific application. Inkscape is a vector graphic media-specific application. The learning aids

below contains tutorials for the applications just mentioned.

Learning Aids:

Videos (Inkscape)

Inkscape Tutorial: Complete Starter Guide for New Users

Color Theory

Basic Color Theory by Colormatters.com

Color Theory by Bailey Kinney

You may search for other tutorials and videos on the web. This is a beginner list. There is a

wealth of advanced videos and tutorials out there. Please do not limit your resources to this

list. If you find other resources, place the links or document in the Learning Repository of your

notebook. It is important that you take time to play with the software. Remember to make

sure you are on the correct layer before you make any changes.

Project Creation Criteria:

Remember, it is important that you learn and play with the software.

Vector Game Card

Vector applications are essential to the creation of logos and graphics that need to be scaled to

enormous size. Raster images do not scale well because you can begin to actually see the

squares (pixels). In this graphic, you will create a scalable image. It is important that you view

the videos above and find other videos that may help with the techniques for this project.

1. Your task is to model the front of a card. Search around the house or ask a friend if they

have deck of cards: choose a 4 card of any suit: spade, heart, club, or diamond.

2. Once you find your card to model, take a picture of the card and save the image.

Rename/Save the image as FirstnameLastnamegamecard.jpg

o If I choose to model the 4 of spades, I would name the file

ChaunceyKeaton4spades.jpg

3. Open Inkscape and begin to model. (Do not use a transparent background.) Inkscape

initially opens to a blank page. Click the rectangle tool on the left side and create a

rectangle on the page.

4. Change the color to the same color of your card using the color palette at the bottom

(most cards are an off-white color).

5. Select the “Edit paths by nodes tool” and the bounding box will have a circle in the top

right corner. Use the pointy tool to click the circle and drag down to shape the corners

of the card. You have just created a blank card.

6. In the layers panel, change the name of layer 1 to card. Create two new layers by

clicking the plus sign and dragging above the card layer. Name new layers number and

suit respectively. Begin to design the number on the number layer. Make sure to click

the number layer. Then begin to design the suit on the suit layer. Make sure to click the

suit layer. The lock and eye next to the layer name locks the layer for editing and the

eye makes is visible and not visible respectively.

o This is the beauty of learning. I cannot solely identify a way for you to model the

card. Watch the videos listed in the learning aids above and mimic the

techniques used as far as alignment, rotations, color selections, etc. Use the

tools of the application. You will primarily use the pen tool.

o You will use the pen tool (Bezier draw tool) a lot. You should not use the pencil

tool (free hand tool) at all in this project. Using the pencil tool makes it more

difficult. Focus on creating each individual aspect of the card so that you can

duplicate that aspects and rotate it. Detail!

o The majority of this task is to design the each element once. You only have to

design the number once using the pen tool. You only have to design the suit

chosen using the pen tool and possibly a shape tool. Once you design the two

images, you only need to copy, paste, and possibly rotate the copies to replicate

the card.

o Most playing cards have 2 numbers. Create one number to perfection. I am

looking for super accuracy. Then just copy and paste to create the second. You

can do the same for the other image on the card. Using a font or image to get

close to a number or suit will not suffice. Design the symbol accurately! Do not

choose a font for the number(s).

7. Once finished, Save the file as FirstnameLastnamegamecard.svg.

8. Then export

Project Submission Criteria:

You will submit 2 documents as attachments in the Vectored Game Card Project dropbox:

FirstnameLastnamegamecard.pdf

FirstnameLastnamegamecard.svg

Grading Criteria Vector Card: (100pts)

You will be graded based on the criteria specified above. Your goal is to create a full replication

of the card in your picture. You are graded on accurate development. You should not have

any font-face in the card. You must develop each aspect of the card manually by using drawing

tools. This card has 3 aspects to design: The card, the number, and the suit.

1. The card

a. Card is drawn (5pts)

b. Rounded edges (5pts)

c. Card is colored (not pure white like the background color) (5pts)

2. The number (incremental changes between criteria are 3pts each as justified)

a. The number is fully accurately drawn using the pen tool, duplicated w/correct color,

properly aligned and rotated (35pts)

b. The number is somewhat accurately drawn using the pen tool, duplicated w/correct

color, properly aligned and rotated (25pts)

c. The number is somewhat accurately drawn using the pen tool and not duplicated

(18pts)

d. The number is inaccurately drawn using the pen tool and duplicated (12pts)

e. The number is inaccurately drawn using the pen tool and duplicated (6pts)

f. A font-face was used instead of actually drawing the number using the pen tool (0pts)

3. The suit (incremental changes between criteria are 5pts each as justified)

a. The suit is fully accurately drawn using the pen tool, duplicated w/correct color,

properly aligned and rotated (50pts)

b. The suit is somewhat accurately drawn using the pen tool, duplicated w/correct

color, properly aligned and rotated (35pts)

c. The suite is inaccurately drawn using the pen tool and duplicated (15pts)

d. A font-face/image was used instead of actually drawing the suit using the pen tool

(0pts)

o None submission will result in a full point deduction (-100pt).

o Max points is 100pts.

o The card should have edges and a background color as appropriate.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science Wk 2 assignment

Please see attachment for instructions provide a one-page response to the following topic below utilizing supporting documentation obtained from your textbooks and the Internet.  Be sure to include an APA Reference Page Topic: Assess the various Access Control methods.

Discussion and Replies

Please see attachment for instructions.       In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Based on the readings for chapter 3 Information Security Fundamentals and chapter 3&4 Information Security: Design, Implementation, Measurement, and Compliance, Discuss the following. 1. What are

How can businesses benefit from incorporating AI Integration Services into their digital transformation strategies?

[url= Integration Services[/url] are transforming businesses by streamlining operations, enhancing customer experiences, and enabling data-driven decisions. By automating repetitive tasks, AI frees up resources for more strategic activities, improving productivity. AI tools like chatbots and recommendation engines offer personalized solutions, fostering customer loyalty. AI also helps businesses analyze large datasets

OSINT Project 2

 Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your work. 

OSINT Project

Instructions Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your

D 6 of 459

Follow the attach instructions to complete this work Questions: 1. How is technology increasingly used in healthcare beyond electronic health records (HER)?  Give some examples. 2. Would you personally participate in robot assisted/telesurgery as a patient or a medical professional?  Why or why not? Resources 20 Examples Of IoT Wearables

D 5 of 459

Follow the attach instructions to complete the work. Questions: 1. What are service robots and how are they used and categorized?  Give examples of each. 2. How would you leverage service robots to improve the availability, confidentiality, and integrity of a large (20MW+) data center? Resources Robots as a Platform

ITS 10 Help

Ethical Hacking help Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 10: Web Pentesting 2. NDG Ethical Hacking Lab 11: Client Side Exploitations After

InfSec

 Blockchain technology will revolutionize cybersecurity

ITS 12 Help

Ethical HAcking Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 08: Password Cracking with JTR and Hashcat 2. NDG Ethical Hacking Lab 17: Creating

ITS 13 Help

Ethical Hacking  Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 06: Network Analysis 2. NDG Ethical Hacking Lab 07: Evading IDS Submit Your Lab

Replies

please see attachment for instructions   In 400 word total, replying to the 2 post below. Each reply must be 200 word.      N.B Post #1 Hello classmates,   I am active duty in the military and currently on Eastern Standard Time. I have 4 kids, I’ve been in

channing 4.25 r studio work

follow the insrtuction Group Project Mostafa Rezaei Big Data (Introduction to Data Science) General information The group project gives you the opportunity to practice many of the skills we learned in the class. It includes 5 steps: Step 1: Find and describe a data set Find a publicly available data

Computer Science English Homework

● Assignment to do For this assignment, research different tools that cloud storage service providers use to manage the vast arrays of drives in their environments. Also, research the current performance and trends of the types of hard drives in use: magnetic vs. SSD. Summarize your research in a 2-3

SQL Help13

Statements and query For the final project, you will be working with a Guitar Shop.  You will need the MySQL server and MySQL workbench installed, just as it has been throughout the class. You will also need the following file: Project Requirements: 1. Execute the attached create_my_guitar_shop.sql to create the

Computer Science WK1 Assignment

Please see attachment for instructions and PDF book     W1 Assignment Instructions:   In 2 pages, answer the questions below with 5 evidence base scholarly articles in APA format.  Recommend and expand upon Information Security & Risk Management. 1. What are some internal and external security threats when dealing