Byte Battle

Level Up Your Learning

Byte Battle is an educational Trading Card Game (TCG) designed for 6th-8th graders to learn Computer Science concepts through fast-paced, strategic duels.

Start the Duel!

The Design Protocol

Byte Battle was created by EduTCG a Google Gemini Gem design project focused on educational emergent gameplay. The primary goal was to make complex topics from the North Carolina K-12 Computer Science Standards (Grades 6-8) fun and accessible.

Target Audience & Curriculum

The game directly addresses middle school standards including **68-CS-02 (Hardware/Software)** and **68-NI-04 (Encryption)**. We translated concepts like **Firewalls**, **Routers**, and **Protocols** into tangible card effects to bridge the gap between abstract learning and practical application.

Emergent Gameplay Focus

Inspired by classic TCG design, we ensured cards have synergistic interactions. For instance, using the **Router** (Hardware) rewards successful attacks, encouraging players to chain **Network Tracer** attacks (Network Cards) for higher value—a core element of emergent strategy.

The Core Rules: System Warfare

Objective

Players duel by building a **System** of components to attack the opponent's core **Tier 1 System**. You win the game when your opponent's **Tier 1 System** is reduced to **Level 0**.

Setup (Quick Version)

  • Each player starts with **20 Life Points**.
  • Shuffled Deck size: **40 cards**.
  • Starting Hand: **5 cards**.
  • Start a **Tier 1 System** card at **Level 1** (The core target).
  • Starting Resources: **3 Data Packet (Energy)** available.

Turn Flow

  1. 1. Start Phase: Draw **1 card**. Gain **1 Data Packet (Energy)**.
  2. 2. Main Phase (Action Loop): Perform actions as desired:
    • **Play a Card:** Pay its Energy **Cost**.
    • **Use a Component Action:** **Rest** (turn sideways) a Component to use its ability.
    • **Level Up System:** Pay **2 Energy** to increase your **Tier 1 System's** Level by 1 (max 5).
  3. 3. End Phase: Turn all your **Rested** cards **Active** (upright).

Card Mockups: Hardware, Software, Network

CPU: Processor
Component - Hardware
LEVEL: 2 COST: 2

**Action:** **Rest** this card. Choose a Component Card you control. That card deals **1 Damage** to an enemy Component's Level.

*CS Concept: Processing & Execution.*

Firewall
Component - Software
LEVEL: 3 COST: 3

**Passive:** (Always Active) When an opponent plays a **Network Card**, the card's effect damage is reduced by **1** (min 0).

*CS Concept: Digital Security Measure (68-NI-02).*

Data Encryption
Network - One-Shot
COST: 2

**Effect:** Reduce the damage dealt by an incoming **Network Card** by **3** this turn.

*CS Concept: Secure Transmission (68-NI-04).*

Tier 1 System
System - Core Target
LIFE POINTS: 20 LEVEL: Varies

**Passive:** This card's **Level** is equivalent to your **Life Points**. When this card's Level is reduced to 0, you lose the game.

*The essential core of your digital identity.*