Magic Cube Puzzle

Reklamalar mavjud
4,0
5,34 ming ta sharh
5 mln+
Yuklanmalar
Yoshga oid cheklov
3+
Skrinshot
Skrinshot
Skrinshot
Skrinshot

Bu oʻyin haqida

The world's Best Endless Cube Game! The MOST attractive cube puzzle game EVER!

DOWNLOAD the latest magic cube game for FREE!

If you are learning Fridrich Method, our app will be helpful. You can use this app to check out all algorithms of Fridrich Method. Or If you like puzzle game, we also provide endless cube puzzles for solving. Try to solve the cube puzzle in the limit of steps.

Features:
A realistic cube model.
Smooth rotate.
Endless puzzles.

Main Scene:
Play: You need to solve the cube puzzle in the limit of steps. Which level can you achieve?
Practice: Just let you play the Cube in a free way.
Algorithms: Show All CFOP Algorithms that contains 41 F2L, 57 OLL and 21 PLL.

/**************************************/
Follows is the 4 steps of CFOP Method:
1. The Cross
This first stage involves solving the four edge pieces in one outer layer of the puzzle, centering around a commonly colored center piece.

2. First Two Layers (F2L)
In F2L, corner and edge pieces are paired up and later moved to their correct location. There are 42 standard cases for each corner-edge pair including the case where it is already solved. It can also be done intuitively.

3. Orientation of the Last Layer (OLL)
This stage involves manipulating the top layer so that all the pieces therein have the same color on top, at the expense of incorrect colors on other sides. This stage involves a total of 57 algorithms. A simpler version, called "two-look OLL" orients edges and corners separately. It uses nine algorithms, two for edge orientation and seven for corner orientation.

4. Permutation of the Last Layer (PLL)
The final stage involves moving the pieces of the top layer while preserving their orientation. There is a total of 21 algorithms for this stage. They are distinguished by letter names, usually based on what they look like with arrows representing what pieces are swapped around. "Two-look" PLL solves the corners and edges separately. It uses six algorithms, two for corner permutation and four for edge permutation.
Oxirgi yangilanish
26-dek, 2024

Maʼlumotlar xavfsizligi

Xavfsizlik — dastur ishlab chiquvchilar maʼlumotlaringizni qanday jamlashi va ulashishini tushunishdan boshlanadi. Maʼlumotlar maxfiyligi va xavfsizlik amaliyotlari ilovadan foydalanish, hudud va yoshga qarab farq qilishi mumkin. Bu axborot dastur ishlab chiquvchi tomonidan taqdim etilgan va keyinchalik yangilanishi mumkin.
Tashqi hamkorlarga hech qanday axborot ulashilmagan
Dastur ishlab chiquvchilar axborot ulashilishini qanday aytishi haqida batafsil
Ushbu ilova quyidagi axborot turlarini toʻplashi mumkin
Joylashuv va Qurilma yoki boshqa identifikatorlar
Maʼlumotlar shifrlanmagan
Maʼlumotlar oʻchmaydi

Reytinglar va sharhlar

3,8
4,99 ming ta sharh
Alloh yagona
23-avgust, 2024
Menga yoqmadi
28 kishi bu sharhni foydali deb topgan
Buni foydasi tegdimi?
Sevinch Hakimova
27-avgust, 2024
Zór
33 kishi bu sharhni foydali deb topgan
Buni foydasi tegdimi?
Боходир Алибоев
1-iyun, 2024
Tortila tavsiya qilaman zor ekan
26 kishi bu sharhni foydali deb topgan
Buni foydasi tegdimi?

Nima yangiliklar

Fix bugs