際際滷

際際滷Share a Scribd company logo
Trading card game kata 
1. Preparation 
 Each player starts the game with 30 Health and 0 Mana slots 
 Each player starts with a deck of 20 Damage cards with the following Mana costs: 0,0,1,1,2,2,2,3,3,3,3,4,4,4,5,5,6,6,7,8 
 From the deck each player receives 3 random cards has his initial hand 
2. Gameplay 
 The active player receives 1 Mana slot up to a maximum of 10 total slots 
 The active player's empty Mana slots are refilled 
 The active player draws a random card from his deck 
 The active player can play as many cards as he can afford. Any played card empties Mana slots and deals immediate damage to the opponent player equal to its Mana 
cost. 
 If the opponent player's Health drops to or below zero the active player wins the game 
 If the active player can't (by either having no cards left in his hand or lacking sufficient Mana to pay for any hand card) or simply doesn't want to play another card, the 
opponent player becomes active 
3. Special Rules 
 Bleeding Out: If a player's card deck is empty before the game is over he receives 1 damage instead of drawing a card when it's his turn. 
 Overload: If a player draws a card that lets his hand size become >5 that card is discarded instead of being put into his hand. 
 Dud Card: The 0 Mana cards can be played for free but don't do any damage either. They are just annoyingly taking up space in your hand. 
Page 1

More Related Content

Viewers also liked (20)

PPTX
Motion
Romelyn Manalo
PPTX
[1]覦 覦 覲
kyobosns
PPT
過求求 =求求戟 ≡= 求梶
babylonboss
PDF
Novogradac - 8-2011 pg51 (E. Usinger - Twinning NMTCs with 7a Loans)
Eric Usinger
PPT
Hirschsprung's disease
Sameh Shehata
PPTX
Ban hang qua i棚味n thoa味i
theknife_1801
PPS
Michael Jackson heal the world
P.K.
PPTX
Item22 when using the pimpl idiom, define special memberfuctions in the imple...
PDF
Handbook of biofertilizers and biopesticides
scm9961
PPT
080515る襯伎螳
seekly
PDF
Py conkr 20150829_docker-python
Eric Ahn
PDF
Fashion and clothing in ancient times
mswilsonri
PDF
碁15覿 語 觜 - 危谿 ろ觜
cbs15min
PDF
2013 Toyota Land Cruiser - Cabe Toyota
cabetoyota
PDF
Wom Workshop English
gianandrea facchini
PDF
Benson Yeh - Busting Boundaries Award - DILA 2015
Ping-Cheng Yeh
PPT
ebook research_2010
rdy1052
PPTX
Complain portal reaching out to customers
Pavan Kumar Vijay
PDF
皆鰻皆脚覯
EUzzang
PPT
Mongo db sharding
Sejoon Lim
[1]覦 覦 覲
kyobosns
過求求 =求求戟 ≡= 求梶
babylonboss
Novogradac - 8-2011 pg51 (E. Usinger - Twinning NMTCs with 7a Loans)
Eric Usinger
Hirschsprung's disease
Sameh Shehata
Ban hang qua i棚味n thoa味i
theknife_1801
Michael Jackson heal the world
P.K.
Item22 when using the pimpl idiom, define special memberfuctions in the imple...
Handbook of biofertilizers and biopesticides
scm9961
080515る襯伎螳
seekly
Py conkr 20150829_docker-python
Eric Ahn
Fashion and clothing in ancient times
mswilsonri
碁15覿 語 觜 - 危谿 ろ觜
cbs15min
2013 Toyota Land Cruiser - Cabe Toyota
cabetoyota
Wom Workshop English
gianandrea facchini
Benson Yeh - Busting Boundaries Award - DILA 2015
Ping-Cheng Yeh
ebook research_2010
rdy1052
Complain portal reaching out to customers
Pavan Kumar Vijay
皆鰻皆脚覯
EUzzang
Mongo db sharding
Sejoon Lim

Recently uploaded (20)

PDF
My Journey from CAD to BIM: A True Underdog Story
Safe Software
PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
PDF
99 Bottles of Trust on the Wall Operational Principles for Trust in Cyber C...
treyka
PDF
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
PDF
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
PPSX
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
PDF
Next level data operations using Power Automate magic
Andries den Haan
PDF
How to Visualize the Spatio-Temporal Data Using CesiumJS
SANGHEE SHIN
PDF
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
PPTX
Enabling the Digital Artisan keynote at ICOCI 2025
Alan Dix
PDF
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
PDF
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
PDF
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
PDF
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
PDF
Kubernetes - Architecture & Components.pdf
geethak285
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
My Journey from CAD to BIM: A True Underdog Story
Safe Software
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
James Anderson
99 Bottles of Trust on the Wall Operational Principles for Trust in Cyber C...
treyka
Java 25 and Beyond - A Roadmap of Innovations
Ana-Maria Mihalceanu
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Pitch ...
Michele Kryston
Hyderabad MuleSoft In-Person Meetup (June 21, 2025) 際際滷s
Ravi Tamada
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
Next level data operations using Power Automate magic
Andries den Haan
How to Visualize the Spatio-Temporal Data Using CesiumJS
SANGHEE SHIN
''Taming Explosive Growth: Building Resilience in a Hyper-Scaled Financial Pl...
Fwdays
Enabling the Digital Artisan keynote at ICOCI 2025
Alan Dix
Redefining Work in the Age of AI - What to expect? How to prepare? Why it mat...
Malinda Kapuruge
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
TrustArc Webinar - Navigating APAC Data Privacy Laws: Compliance & Challenges
TrustArc
Simplify Your FME Flow Setup: Fault-Tolerant Deployment Made Easy with Packer...
Safe Software
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
Kubernetes - Architecture & Components.pdf
geethak285
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
Ad

Trading card game

  • 1. Trading card game kata 1. Preparation Each player starts the game with 30 Health and 0 Mana slots Each player starts with a deck of 20 Damage cards with the following Mana costs: 0,0,1,1,2,2,2,3,3,3,3,4,4,4,5,5,6,6,7,8 From the deck each player receives 3 random cards has his initial hand 2. Gameplay The active player receives 1 Mana slot up to a maximum of 10 total slots The active player's empty Mana slots are refilled The active player draws a random card from his deck The active player can play as many cards as he can afford. Any played card empties Mana slots and deals immediate damage to the opponent player equal to its Mana cost. If the opponent player's Health drops to or below zero the active player wins the game If the active player can't (by either having no cards left in his hand or lacking sufficient Mana to pay for any hand card) or simply doesn't want to play another card, the opponent player becomes active 3. Special Rules Bleeding Out: If a player's card deck is empty before the game is over he receives 1 damage instead of drawing a card when it's his turn. Overload: If a player draws a card that lets his hand size become >5 that card is discarded instead of being put into his hand. Dud Card: The 0 Mana cards can be played for free but don't do any damage either. They are just annoyingly taking up space in your hand. Page 1