Difference between revisions of "Edge template IV2h"

From HexWiki
Jump to: navigation, search
(Created page with "The template: <hexboard size="4x5" coords="hide" contents="E *:a1 E *:b1 E *:c1 R e1 E *:a2 E *:b2 E *:a3 R c4" /> (From: [http://www.drking.org.uk/hexagons/hex/...")
 
(Converted to new hexboard diagrams)
 
Line 1: Line 1:
The template:
+
Template IV2-h is a 4th row [[edge template]] with 2 stones.
  
 
<hexboard size="4x5"
 
<hexboard size="4x5"
 
   coords="hide"
 
   coords="hide"
 +
  edges="bottom"
 +
  visible="-area(c1,a3,a1)"
 
   contents="E *:a1 E *:b1 E *:c1 R e1 E *:a2 E *:b2 E *:a3 R c4"
 
   contents="E *:a1 E *:b1 E *:c1 R e1 E *:a2 E *:b2 E *:a3 R c4"
 
   />
 
   />
 
    
 
    
 
(From: [http://www.drking.org.uk/hexagons/hex/templates.html www.drking.org.uk])
 
(From: [http://www.drking.org.uk/hexagons/hex/templates.html www.drking.org.uk])
 +
 +
== Defending the template ==
  
 
Red has two threats:
 
Red has two threats:
Line 12: Line 16:
 
<hexboard size="4x5"
 
<hexboard size="4x5"
 
   coords="hide"
 
   coords="hide"
   contents="E *:a1 E *:b1 E *:c1 E +:d1 R e1 E *:a2 E *:b2 R 1:c2 E +:d2 E *:a3 E +:b3 E +:c3 E +:a4 E +:b4 R c4"
+
  edges="bottom"
 +
  visible="-area(c1,a3,a1)"
 +
   contents="E *:a1 E *:b1 E *:c1 E +:d1 R e1 E *:a2 E *:b2 R A:c2 E +:d2 E *:a3 E +:b3 E +:c3 E +:a4 E +:b4 R c4"
 
   />
 
   />
  
Line 19: Line 25:
 
<hexboard size="4x5"
 
<hexboard size="4x5"
 
   coords="hide"
 
   coords="hide"
   contents="E *:a1 E *:b1 E *:c1 R e1 E *:a2 E *:b2 R 1:e2 E *:a3 E +:d3 E +:e3 R c4 E +:d4 E +:e4"
+
  edges="bottom"
 +
  visible="-area(c1,a3,a1)"
 +
   contents="E *:a1 E *:b1 E *:c1 R e1 E *:a2 E *:b2 R B:e2 E *:a3 E +:d3 E +:e3 R c4 E +:d4 E +:e4"
 
   />
 
   />
  

Latest revision as of 17:37, 10 December 2020

Template IV2-h is a 4th row edge template with 2 stones.

(From: www.drking.org.uk)

Defending the template

Red has two threats:

A

using III-2-d and

B

also using III-2-d.

Since there is no overlapping field, Blue can't block Red's connection.


See also

Multiple threats