Visual programming with Alice
The test condition next to while is obviously trivial. Instead, you could have set a more complex condition to tell Nemo to start swimming only if another fish collides with him. Functions are especially helpful in putting together a test condition; you will find them in a tab in the left pane. Functions return values such as Nemo's location, size, or color.
When you hover over one of the functions, Alice marks places in the editor, where you can use them. Just like Nemo, the other objects in the 3D world also have procedures and functions. Alice enumerates them if you click on them in the scene, or if you select them in the oversized drop-down list below the preview.
Finally, note that Nemo consists of several parts that you can move or manipulate independently of one other. If you want the fish to swish its tail, select this.Nemo from the large drop-down list, then move over to the small triangle and opt for this.Nemo.getTail. All the procedures and functions now shown in the list refer only to the tail. In this way, you can animate the tail during the swim.
Programming is not so difficult. With Alice, a few clicks of the mouse are enough to let a fish swim in the sea. This simple animation only scratches the surface of the development environment's possibilities.
If you enjoyed working with Alice thus far, you can simply experiment with the other procedures and functions. You might want to wait for a work-free, rainy weekend for experimentation: Alice is addictive and time flies when you're having fun.
An overview of the user interface is provided by the online help , the detailed HowTos, screencasts of the "Alice 3.1 curriculum resources" , and various English language books, all of which still reference Alice 2 .
- Alice: http://www.alice.org
- Alice online help: http://help.alice.org/w/page/57584293/Getting%20Started%20with%20Alice%203_1
- Alice 3.1 Curriculum Resources: http://www.alice.org/index.php?page=3.1/download_materials
- Books about Alice 2: http://www.alice.org/index.php?page=documentation
Buy this article as PDF
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems