"Zork" was originally MIT hacker slang for an unfinished program. The implementors briefly named the completed game Dungeon, but changed it back to Zork after receiving a trademark violation notice from the publisher of Dungeons & Dragons. Zork has also been adapted to a book series.
Three of the original Zork programmers joined with others to found Infocom in 1979. That company adapted the PDP-10 Zork into Zork I-III, a trilogy of games for most popular small computers of the era, including the Apple II, the Commodore 64, the Commodore Plus/4, the Atari 8-bit family, the TRS-80, CP/M systems and the IBM PC. Zork I was published on 5¼" and 8" floppy disks. Joel Berez and Marc Blank developed a specialized virtual machine to run Zork I, called the Z-machine. The first "Z-machine Interpreter Program" ZIP for a small computer was written by Scott Cutler for the TRS-80. The trilogy was written in ZIL, which stands for "Zork Implementation Language", a language similar to LISP. Personal Software published what would become the first part of the trilogy under the name Zork when it was first released in 1980, but Infocom later handled the distribution of that game and their subsequent games. Part of the reason for splitting Zork into three different games was that, unlike the PDP systems the original ran on, micros did not have enough memory and disk storage to handle the entirety of the original game. In the process, more content was added to Zork to make each game stand on its own. A version of Zork I was issued as a hidden 'easter egg' in Call of Duty: Black Ops, a video game produced as a collaboration between Activision and Treyarch in November 2010. It has exactly the same text as in the above picture, and follows the same rules that the original does.
Zork distinguished itself in its genre as an especially rich game, in terms of both the quality of the storytelling and the sophistication of its text parser, which was not limited to simple verb-noun commands ("hit grue"), but some prepositions and conjunctions ("hit the grue with the Elvish sword").
FrobozzCo International is a fictional monopolous conglomerate from the game. FrobozzCo products are littered throughout all Zork games, often with humorous effect.
After a six year hiatus, the following games were produced:
The Enchanter trilogy and Wishbringer occupy somewhat unusual positions within the Zork universe. Enchanter was originally developed as Zork IV; Infocom decided to instead release it separately, however, and it became the basis of a new trilogy. (In each trilogy, there is a sense of assumed continuity; that is, the player's character in Zork III is assumed to have experienced the events of Zork I and Zork II. Similarly, events from Enchanter are referenced in Sorcerer and Spellbreaker; but the Enchanter character is not assumed to be the same one from the Zork trilogy. In fact, in Enchanter the player's character encounters the Adventurer from Zork, who helps the player's character solve a puzzle in the game.) Although Wishbringer was never officially linked to the Zork series, the game is generally agreed to be "Zorkian" due to its use of magic and several terms and names from established Zork games.
Activision's 1996 compilation, Classic Text Adventure Masterpieces of Infocom, includes all the text-based Zork games; the Zork and Enchanter trilogies, Wishbringer, Beyond Zork and Zork Zero.
Activision briefly offered free downloads of Zork I as part of the promotion of Zork: Nemesis, and Zork II and Zork III as part of the promotion for Zork Grand Inquisitor, as well as a new adventure: Zork: The Undiscovered Underground.
Of six novels published as "Infocom Books" by Avon Books between 1989–1991, four were directly based on Zork: The Zork Chronicles by George Alec Effinger (1990), The Lost City of Zork by Robin W. Bailey (1991), Wishbringer by Craig Shaw Gardner and Enchanter, also by Bailey.
In 2006, an over-the-phone version of Zork entitled Zasterisk entered beta testing. Programmed by Simon Ditner using Asterisk and the Festival Speech Synthesis System, players can call in and play Zork over the phone by speaking voice commands. The results are read back by the automated text-to-voice synthesis system. It is now known as Zoip, a reference to VoIP.
The latest installation of the Zork series is Legends of Zork, a persistent browser-based MMORPG, which was released on April 1, 2009.
2010 saw Zork I, Zork II, Zork III, and Mini-Zork formatted specifically for the Amazon Kindle – with more interactive text adventures promised for the platform.
A full version of Zork I is playable on a computer terminal in the interrogation room in the 2010 game where it unlocks the achievement or bronze trophy (Xbox 360 or PS3, respectively) called "Eaten by a Grue".
Since January 18, 2011 Zork Anthology (featuring Zork I, Zork II, Zork III, Beyond Zork, Zork Zero and Planetfall) is internationally available at Good Old Games, in a form of digital download.
In all of the Zork text adventures, the following commands apply:
> n, s, e, w : Short for "go north", "go south", etc. > nw, ne, sw, se : Short for "go northwest", "go southwest", etc. > u and d : Short for "go up" and "go down" > i : Reveals a player's inventory > verbose : Gives full descriptions after each command (rather than omitting details already given to the player) > score : Displays the player's current score, number of moves, and ranking
The Fortran version of Dungeon was widely available on DEC VAXes, being one of the most popular items distributed by DECUS. It went through multiple modifications both to incorporate more features from the original and to track changes in the MDL version. In the late 1980s, the Fortran version was extensively rewritten for VAX Fortran and became fully compatible with the last MDL release. It had one extra joke: an apparent entrance to the Mill (a reference to DEC's headquarters) that was, in fact, impassable.
It also had a gdt command (game debugging technique, a reference to the DDT debugger) which enabled the player to move any object (including the player) to any room. Use of gdt required answering a random question requiring deep knowledge of the game. The game's response to a wrong answer (“A booming voice says ‘Wrong, cretin!’ and you notice that you have turned into a pile of dust”) appears in many "fortune cookie" databases.
The FORTRAN version was also included in the distribution media for some Data General operating systems. It was used as an acceptance test to verify that the OS had been correctly installed. Being able to compile, link, and run the program demonstrated that all of the run-time libraries, compiler, and link editor were installed in the correct locations.
Category:Interactive fiction Category:1977 video games Category:Amiga games Category:Apple II games Category:Atari 8-bit family games Category:Atari ST games Category:Commodore 64 games Category:DOS games Category:Internet memes Category:Mainframe games Category:MSX games Category:TRS-80 games Category:Video games with textual graphics
This text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
The World News (WN) Network, has created this privacy statement in order to demonstrate our firm commitment to user privacy. The following discloses our information gathering and dissemination practices for wn.com, as well as e-mail newsletters.
We do not collect personally identifiable information about you, except when you provide it to us. For example, if you submit an inquiry to us or sign up for our newsletter, you may be asked to provide certain information such as your contact details (name, e-mail address, mailing address, etc.).
When you submit your personally identifiable information through wn.com, you are giving your consent to the collection, use and disclosure of your personal information as set forth in this Privacy Policy. If you would prefer that we not collect any personally identifiable information from you, please do not provide us with any such information. We will not sell or rent your personally identifiable information to third parties without your consent, except as otherwise disclosed in this Privacy Policy.
Except as otherwise disclosed in this Privacy Policy, we will use the information you provide us only for the purpose of responding to your inquiry or in connection with the service for which you provided such information. We may forward your contact information and inquiry to our affiliates and other divisions of our company that we feel can best address your inquiry or provide you with the requested service. We may also use the information you provide in aggregate form for internal business purposes, such as generating statistics and developing marketing plans. We may share or transfer such non-personally identifiable information with or to our affiliates, licensees, agents and partners.
We may retain other companies and individuals to perform functions on our behalf. Such third parties may be provided with access to personally identifiable information needed to perform their functions, but may not use such information for any other purpose.
In addition, we may disclose any information, including personally identifiable information, we deem necessary, in our sole discretion, to comply with any applicable law, regulation, legal proceeding or governmental request.
We do not want you to receive unwanted e-mail from us. We try to make it easy to opt-out of any service you have asked to receive. If you sign-up to our e-mail newsletters we do not sell, exchange or give your e-mail address to a third party.
E-mail addresses are collected via the wn.com web site. Users have to physically opt-in to receive the wn.com newsletter and a verification e-mail is sent. wn.com is clearly and conspicuously named at the point of
collection.If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by following the instructions included in each newsletter or communication or by e-mailing us at michaelw(at)wn.com
The security of your personal information is important to us. We follow generally accepted industry standards to protect the personal information submitted to us, both during registration and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100 percent secure, however. Therefore, though we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
If we decide to change our e-mail practices, we will post those changes to this privacy statement, the homepage, and other places we think appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.
If we make material changes to our e-mail practices, we will notify you here, by e-mail, and by means of a notice on our home page.
The advertising banners and other forms of advertising appearing on this Web site are sometimes delivered to you, on our behalf, by a third party. In the course of serving advertisements to this site, the third party may place or recognize a unique cookie on your browser. For more information on cookies, you can visit www.cookiecentral.com.
As we continue to develop our business, we might sell certain aspects of our entities or assets. In such transactions, user information, including personally identifiable information, generally is one of the transferred business assets, and by submitting your personal information on Wn.com you agree that your data may be transferred to such parties in these circumstances.