Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

vector card project

instruction are on the vectored card pdf and the card to use is attached as well

Vectored Game Card Project

Gimp (free) is one of the most popular open source photo/raster image editors. Also, Inkscape

is one of the few (free) alternative vector graphic applications. For all your graphic needs in this

course, you may use the editor of your choice; but, all instructions for this project will be based

on Gimp and Inkscape. If you use another graphic editor, the instructions do not

translate/correspond.

Go to Gimp and Inkscape websites and download the appropriate software for your computer.

One of the first things that you must learn when working with graphic media-specific software

is the choice of software. You must gain an understanding of raster versus vector. Photoshop

and Corel Paintshop are primary raster (pixel) image editors. The focus is on small little

squares. Illustrator, Fireworks, Inkscape, and Corel Draw are primarily vector-based

(mathematical) applications. They focus on the math of the line just as you learned in graphing

Ax + By = C in your math courses. Gimp (free) is more of a raster editor than a vector media-

specific application. Inkscape is a vector graphic media-specific application. The learning aids

below contains tutorials for the applications just mentioned.

Learning Aids:

Videos (Inkscape)

Inkscape Tutorial: Complete Starter Guide for New Users

Color Theory

Basic Color Theory by Colormatters.com

Color Theory by Bailey Kinney

You may search for other tutorials and videos on the web. This is a beginner list. There is a

wealth of advanced videos and tutorials out there. Please do not limit your resources to this

list. If you find other resources, place the links or document in the Learning Repository of your

notebook. It is important that you take time to play with the software. Remember to make

sure you are on the correct layer before you make any changes.

Project Creation Criteria:

Remember, it is important that you learn and play with the software.

Vector Game Card

Vector applications are essential to the creation of logos and graphics that need to be scaled to

enormous size. Raster images do not scale well because you can begin to actually see the

squares (pixels). In this graphic, you will create a scalable image. It is important that you view

the videos above and find other videos that may help with the techniques for this project.

1. Your task is to model the front of a card. Search around the house or ask a friend if they

have deck of cards: choose a 4 card of any suit: spade, heart, club, or diamond.

2. Once you find your card to model, take a picture of the card and save the image.

Rename/Save the image as FirstnameLastnamegamecard.jpg

o If I choose to model the 4 of spades, I would name the file

ChaunceyKeaton4spades.jpg

3. Open Inkscape and begin to model. (Do not use a transparent background.) Inkscape

initially opens to a blank page. Click the rectangle tool on the left side and create a

rectangle on the page.

4. Change the color to the same color of your card using the color palette at the bottom

(most cards are an off-white color).

5. Select the “Edit paths by nodes tool” and the bounding box will have a circle in the top

right corner. Use the pointy tool to click the circle and drag down to shape the corners

of the card. You have just created a blank card.

6. In the layers panel, change the name of layer 1 to card. Create two new layers by

clicking the plus sign and dragging above the card layer. Name new layers number and

suit respectively. Begin to design the number on the number layer. Make sure to click

the number layer. Then begin to design the suit on the suit layer. Make sure to click the

suit layer. The lock and eye next to the layer name locks the layer for editing and the

eye makes is visible and not visible respectively.

o This is the beauty of learning. I cannot solely identify a way for you to model the

card. Watch the videos listed in the learning aids above and mimic the

techniques used as far as alignment, rotations, color selections, etc. Use the

tools of the application. You will primarily use the pen tool.

o You will use the pen tool (Bezier draw tool) a lot. You should not use the pencil

tool (free hand tool) at all in this project. Using the pencil tool makes it more

difficult. Focus on creating each individual aspect of the card so that you can

duplicate that aspects and rotate it. Detail!

o The majority of this task is to design the each element once. You only have to

design the number once using the pen tool. You only have to design the suit

chosen using the pen tool and possibly a shape tool. Once you design the two

images, you only need to copy, paste, and possibly rotate the copies to replicate

the card.

o Most playing cards have 2 numbers. Create one number to perfection. I am

looking for super accuracy. Then just copy and paste to create the second. You

can do the same for the other image on the card. Using a font or image to get

close to a number or suit will not suffice. Design the symbol accurately! Do not

choose a font for the number(s).

7. Once finished, Save the file as FirstnameLastnamegamecard.svg.

8. Then export

Project Submission Criteria:

You will submit 2 documents as attachments in the Vectored Game Card Project dropbox:

FirstnameLastnamegamecard.pdf

FirstnameLastnamegamecard.svg

Grading Criteria Vector Card: (100pts)

You will be graded based on the criteria specified above. Your goal is to create a full replication

of the card in your picture. You are graded on accurate development. You should not have

any font-face in the card. You must develop each aspect of the card manually by using drawing

tools. This card has 3 aspects to design: The card, the number, and the suit.

1. The card

a. Card is drawn (5pts)

b. Rounded edges (5pts)

c. Card is colored (not pure white like the background color) (5pts)

2. The number (incremental changes between criteria are 3pts each as justified)

a. The number is fully accurately drawn using the pen tool, duplicated w/correct color,

properly aligned and rotated (35pts)

b. The number is somewhat accurately drawn using the pen tool, duplicated w/correct

color, properly aligned and rotated (25pts)

c. The number is somewhat accurately drawn using the pen tool and not duplicated

(18pts)

d. The number is inaccurately drawn using the pen tool and duplicated (12pts)

e. The number is inaccurately drawn using the pen tool and duplicated (6pts)

f. A font-face was used instead of actually drawing the number using the pen tool (0pts)

3. The suit (incremental changes between criteria are 5pts each as justified)

a. The suit is fully accurately drawn using the pen tool, duplicated w/correct color,

properly aligned and rotated (50pts)

b. The suit is somewhat accurately drawn using the pen tool, duplicated w/correct

color, properly aligned and rotated (35pts)

c. The suite is inaccurately drawn using the pen tool and duplicated (15pts)

d. A font-face/image was used instead of actually drawing the suit using the pen tool

(0pts)

o None submission will result in a full point deduction (-100pt).

o Max points is 100pts.

o The card should have edges and a background color as appropriate.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Event Khusus dan Promosi di Witching Pot

“Saya sangat puas dengan pengalaman taruhan di situs ini. Setiap elemen, dari navigasi hingga pembayaran, berjalan dengan mulus. Ini menunjukkan profesionalisme dan kualitas layanan mereka. Saya pasti akan kembali lagi!”

Business/computer

Isolation Discussion Thread: Cybersecurity — Layering-Abstraction-Process Isolation The NSA has identified what they call the First Principles of cybersecurity. The following lists three of these: Principle Last Name Starts With Layering A through H Abstraction I through Q Process Isolation R through Z For your discussion, describe the principle assigned

D 3 of 459

 Building Block Technologies    What is an operational technology?  How is it similar or different than Consumer IoT? What emerging risks can you identify for an operational technology in a hypothetical utilities distribution monitoring & control environment (pipelines & transmission grids)?

D 2 of 459

  Follow the attach document to complete this work. Questions: 1. Consumer Internet of Things (IoT) has become ubiquitous and represents a major vector of cyber risk. Provide examples of consumer IoT that may be found in your own home (not sharing exact details is OK) 2. Provide a high

D 1 of 459

Follow the attach document to complete this work. Building Block Technologies   1. Software, Hardware, and Network Communications are considered building block technologies for enterprises. Define what they are, how they are used and give an example. 2. What are the most notable cyber risks for each type of building block?

D 8 0f 360

Follow the attach document to complete this work. International Cooperation for Cybersecurity   Prepare a 5- to 7-paragraph briefing statement that explains why wealthy nations and developing nations should work together to improve cybersecurity for the globally connected networks referred to as “the Internet.” Your statement should address the following.

D 7 of 360

Follow the attach document to complete this work. Policy Soup: Dealing with the Aftermath of a New Cybersecurity Policy   Prepare a 5 to 7 paragraph “Expert Opinion” for local government officials. This document should present a strategy for communicating with residents about a new “cybersecurity” policy that requires a

D 6 of 360

Follow the attach document to complete this work.  Partnerships for Improving State and Local Government Cybersecurity   Before you begin, read this report:  National League of Cities ( ) (Click the Download Report link at the bottom of the page) Prepare a briefing statement (3 to 5 paragraphs) for a group

D 5 of 360

Follow the attach instruction to complete this work. Background Briefing: How will the Governor’s Initiatives Improve Cybersecurity for the State’s Critical Infrastructures?   Discussion we transition from federal to state critical infrastructure. You are working for the Chief of Staff (CoS) for a newly elected Governor. The governor asked the

D 4 of 360

Follow the attach instruction to complete this work. Panel Presentation: Privacy Impact Assessments (PIA)  Coordinators of an upcoming conference, attended by federal government IT managers and staff, invited you to participate in a panel presentation about privacy. For this activity, prepare a 5 to 7 paragraph briefing statement which answers

Proj4-final

Project 4: Postmigration Activities  Step 1: Postmigration Activities Overview  Like any software development project, migration projects require careful planning to ensure success. This planning includes the postmigration testing and maintenance phase. Start this project by researching and planning the  postmigration activities that will be required to get BallotOnline’s migrated workloads in

Discussion-4

Discussion: Postmigration Approaches and Activities Contains unread posts Now that you have completed BallotOnline’s cloud migration, you will discuss the cloud postmigration activities and approaches. You should cover the following areas: · What is the business impact after the migration? · How will you manage service-level agreements in the cloud?

D 3 of 360

Follow the attach instructions to complete this work. How does FedRAMP help agencies ensure that Digital Government services are secure?   Must post first. Subscribe The format for your week 3 discussion is a backgrounder (“briefing paper”). Background papers are summaries of issues provided to help decision-makers/leaders/managers make decisions. Decision-makers

D 2 of 360

Follow the attach document to complete this work.  Briefing Statement: Security Implications of OPEN Data   Representatives from the  Joint Committee on Cybersecurity and Information Technology have asked you to provide a briefing as part of their “Cyber Scholars Day.” The committee is sponsoring this day of briefings and outreach for

D 1 of 360

Follow the attach document to complete this work. Growing Reliance on Digital Government Services   Your 1 discussion short paper assignment is to write a  workplace newsletter article. As you work on this type of discussion item, think about the newsletters you receive in your workplace. Are they engaging? Do they

Week 3 Discussion: PUMP Versus PMBOK® Guide Approach

I put the links to both the text and the PMBOK Guide, it is through my school library so it may not come up without my login at the botton of the instructions also in bold letters is the information to both the course text and the guide please let

wk 9 distance edu

PLEASE SEE IF YOU CAN LOOK UP THE READING IN THE FILE PORTION, I WAS NOT ABLE TO PULL IT UP UNFORTUNATELY!  After reading “Applying “Design Thinking” in the Context of Media Management EducationLinks to an external site.,” think about all aspects of learning online: activities, workload, faculty-to-learner communication, and

ONLINE VS

PLEASE LET ME KNOW IF U CAN VIEW THE VIDEO IT IS NEEDED TO DO THE ASSIGNMENT  Select three characteristics of online learners or the online environment that seem different from the traditional classroom teaching environment. Review Face-to-Face Versus Online Learning. Describe how they are different and how you would