<s>
Hacker	B-Device
II	I-Device
:	I-Device
The	I-Device
Doomsday	I-Device
Papers	I-Device
is	O
computer	O
game	O
written	O
by	O
Steve	O
Cartwright	O
and	O
published	O
by	O
Activision	O
in	O
1986	B-Application
.	O
</s>
<s>
It	O
is	O
the	O
sequel	O
to	O
the	O
1985	B-Application
game	O
Hacker	B-Application
.	O
</s>
<s>
Hacker	B-Device
II	I-Device
was	O
released	O
for	O
the	O
Amiga	B-Device
,	O
Apple	B-Device
II	I-Device
,	O
Apple	B-Device
IIGS	I-Device
,	O
Amstrad	B-Device
CPC	I-Device
,	O
Atari	B-Device
ST	I-Device
,	O
Commodore	O
64	O
,	O
IBM	O
PC	O
,	O
Macintosh	B-Device
,	O
and	O
ZX	B-Operating_System
Spectrum	I-Operating_System
.	O
</s>
<s>
Hacker	B-Device
II	I-Device
is	O
more	O
difficult	O
and	O
involved	O
than	O
the	O
first	O
game	O
.	O
</s>
<s>
In	O
Hacker	B-Device
II	I-Device
,	O
the	O
player	O
is	O
actually	O
recruited	O
based	O
upon	O
their	O
(	O
assumed	O
)	O
success	O
with	O
the	O
activities	O
in	O
the	O
original	O
game	O
.	O
</s>
<s>
Once	O
again	O
,	O
they	O
are	O
tasked	O
with	O
controlling	O
a	O
robot	B-Algorithm
,	O
this	O
time	O
to	O
infiltrate	O
a	O
secure	O
facility	O
in	O
order	O
to	O
retrieve	O
documents	O
known	O
only	O
as	O
"	O
The	O
Doomsday	O
Papers	O
"	O
from	O
a	O
well	O
guarded	O
vault	O
to	O
ensure	O
the	O
security	O
of	O
the	O
United	O
States	O
.	O
</s>
<s>
A	O
handful	O
of	O
robots	B-Algorithm
are	O
available	O
,	O
hidden	O
in	O
the	O
facility	O
,	O
in	O
case	O
some	O
are	O
lost	O
.	O
</s>
<s>
By	O
using	O
the	O
camera	O
system	O
and	O
in-game	O
map	O
that	O
helps	O
track	O
guard	O
patrols	O
and	O
the	O
location	O
of	O
the	O
robots	B-Algorithm
,	O
the	O
player	O
must	O
explore	O
the	O
one	O
floor	O
facility	O
and	O
find	O
the	O
codes	O
needed	O
to	O
open	O
the	O
vault	O
and	O
escape	O
with	O
the	O
papers	O
.	O
</s>
<s>
This	O
machine	O
pursues	O
the	O
player	O
's	O
defenseless	O
robot	B-Algorithm
and	O
attempt	O
to	O
crush	O
it	O
with	O
the	O
plate	O
.	O
</s>
<s>
The	O
player	O
can	O
try	O
to	O
avoid	O
the	O
drone	O
,	O
although	O
it	O
is	O
relentless	O
in	O
its	O
pursuit	O
and	O
is	O
much	O
faster	O
than	O
the	O
player	O
's	O
robot	B-Algorithm
.	O
</s>
<s>
If	O
all	O
the	O
player	O
's	O
robots	B-Algorithm
are	O
destroyed	O
,	O
the	O
game	O
is	O
over	O
.	O
</s>
<s>
Things	O
that	O
can	O
set	O
off	O
the	O
alarms	O
include	O
being	O
seen	O
by	O
the	O
patrolling	O
guard	O
who	O
has	O
constant	O
line	O
of	O
sight	O
in	O
the	O
corridors	O
,	O
having	O
one	O
of	O
the	O
cameras	O
see	O
the	O
robot	B-Algorithm
,	O
incorrectly	O
disabling	O
the	O
vault	O
security	O
or	O
failing	O
to	O
sync	O
a	O
bypassed	O
camera	O
feed	O
with	O
actual	O
time	O
giving	O
evidence	O
there	O
is	O
tampering	O
going	O
on	O
.	O
</s>
<s>
The	O
game	O
also	O
featured	O
escalating	O
problems	O
as	O
part	O
of	O
the	O
player	O
's	O
interface	O
begins	O
to	O
fail	O
,	O
the	O
in-game	O
map	O
starts	O
to	O
lose	O
progress	O
of	O
the	O
player	O
's	O
robot	B-Algorithm
,	O
monitored	O
security	O
cameras	O
,	O
the	O
guard	O
and	O
eventually	O
the	O
map	O
itself	O
as	O
the	O
player	O
defeated	O
the	O
system	O
,	O
eventually	O
to	O
get	O
into	O
the	O
vault	O
the	O
player	O
may	O
well	O
be	O
forced	O
to	O
control	O
the	O
robot	B-Algorithm
blindly	O
relying	O
on	O
maps	O
that	O
should	O
have	O
been	O
made	O
by	O
the	O
player	O
.	O
</s>
<s>
described	O
Hacker	B-Device
II	I-Device
as	O
not	O
having	O
an	O
original	O
plot	O
and	O
criticized	O
the	O
inability	O
to	O
save	O
,	O
but	O
favorably	O
reported	O
on	O
the	O
game	O
's	O
graphics	O
,	O
detail	O
,	O
and	O
user	O
interface	O
.	O
</s>
<s>
Computer	O
Gaming	O
World	O
praised	O
Hacker	B-Device
IIs	I-Device
graphics	O
and	O
design	O
on	O
the	O
Atari	B-Device
ST	I-Device
,	O
and	O
stated	O
that	O
the	O
game	O
more	O
accurately	O
depicted	O
system	O
cracking	O
than	O
Hacker	B-Application
,	O
but	O
cautioned	O
that	O
its	O
difficulty	O
and	O
scale	O
would	O
not	O
appeal	O
to	O
everyone	O
.	O
</s>
