Next Previous Contents 9. ãªãã·ã§ã³ 人ã«ã¯ãããããããããªå¥½ã¿ããã NetHack ã®éã³æ¹ãããããç°ãªã£ã¦ããã®ã§ãNetHack ã®æ¯ãèãã夿´ããããè¨å®ã§ãããªãã·ã§ã³ãããã 9.1 ãªãã·ã§ã³ã®è¨å® ãªãã·ã§ã³ãè¨å®ããæ¹æ³ã«ã¯ããã¤ãããã ã²ã¼ã ä¸ã« `O' ã³ãã³ãã使ããã¨ã«ãã£ã¦å ¨ã¦ã®ãªãã·ã§ã³ãè¦ããã¨ãã§ãããã®ã»ã¨ãã©ã夿´ã§ããã ã¾ããç°å¢å¤æ°``NETHACKOPTIONS''ãè¨å®ãã¡ã¤ã«ã§èªåçã«è¨å®ãããã¨ãã§ããã NetHack ã®ãã¼ã¸ã§ã³ã«ãã£ã¦ã¯ã²ã¼ã éå§åã«ãªãã·ã§ã³ãè¨å®ãããã¨ãã§ããããã°ã©ã ãã¤ãã¦ãããã¨ãããã ç°å¢å¤æ° NETHACKOPTIONS ã使ã ç°å¢å¤æ° NETHACKOPTIONS ã«ã¯ãããããªãªãã·ã§ã³ã®åæå¤ãã«ã³ãã§åºåã£ã¦åæãè¨å®ããã ãªãã·ã§ã³ã®ãã¡ã®ããã¤ã


{{#tags}}- {{label}}
{{/tags}}