3.8 (22)
الكوكب الأخضر: تنظيف كويست

وصف:

انقاذ الكوكب من التلوث هو درس جيد جدا، ولكن ذلك لا تحرج من ذلك بكثير في هذه اللعبة نحن لا نتحدث عن كوكبنا، ونحن على ما يبدو لم ينقذ؛)
على قطعة أرض بجوار لنا كان كوكب آخر وهو ما يسمى "الخضراء"، ولكن الحطام من على وجه الأرض، وكان على بلدها، وبدأت تأخذ مساحة أكثر وأكثر مع هذا ويجب أن يحارب.

لغز اليوم ليس هو المعيار، لأنها تشبه إلى حد ما هذا النوع من "ثلاثة في صف واحد"، ولكن لديك للعمل مع الساحات، مما يجعلها واحدة من الأربعة كبيرة قليلا، والطريقة الوحيدة لتطهير المنطقة من الحطام والتقدم في اللعبة عابرة. ويعتبر كل مستوى يمكنك الذهاب مع نتائج مختلفة، مقبول كل ما فوق 80٪ من تنظيف نفسها 100٪ ومرغوب فيه، ولكن ليس المطلوب، خصوصا عندما كنت تنظر إلى أن التعقيد المتزايد باستمرار لا يسمح لك للاسترخاء بعد مستويات 20 الأولى كحد أقصى ... فقط جعل الأمر أكثر صعوبة على كل مستوى سوف تأخذ دقيقة واحدة فقط، وهذه المرة بما يكفي في البداية، ولكن بعد ذلك لن يكون ما يكفي من الوقت!
لعبة لديها دونات الذي ينطبق على الحياة، والتي في اللعبة عدد محدود، على وجه الدقة - خمسة. سوف تضيع في كل مرة أنك لن تكون قادرة على تمرير حياة مستوى واحد عندما نفد من خمسة أنك لن تكون قادرا على اللعب لفترة طويلة حتى يشفى أو حتى شرائها مقابل المال الحقيقي؛)

إيجابيات وملامح اللعبة الأخضر الكوكب: تنظيف كويست



عيوب اللعبة الأخضر الكوكب: تنظيف كويست



النتيجة: إيجابية والمباراة مثيرة جدا للاهتمام، مشرقة ونابضة بالحياة، دونات ككل لا تتدخل، وخاصة إذا كان لديك الصبر أو أنك لا تلعب بقدر ما تعقيد اللعبة سوف يصدم العديد من المشجعين من الألغاز!

إعلان

تحميل الكوكب الأخضر: تنظيف كويست 1.1.1.KG

معلومات عامة
نص 1.1.1.KG (16)
تحميل التسجيل 2015-02-27 11:00
حجم 47.82 MB
العربية لا
متطلبات
الروبوت 2.2+
هندسة معمارية ARM6
تحقق التطبيق
يتم إيداع الملف
إذن

Allows the app to control the vibrator.

Allows the app to write to the USB storage.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.

Allows the app to change the state of network connectivity.

Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.

Allows the app to get the list of accounts known by the device. This may include any accounts created by applications you have installed.

Allows the app to prevent the device from going to sleep.

Allows the app to request authentication tokens.

Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to read the contents of your USB storage.

Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the device, potentially including personal or private information.

Allows the app to control the vibrator.

Allows the app to write to the USB storage.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.

Allows the app to change the state of network connectivity.

Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.

Allows the app to get the list of accounts known by the device. This may include any accounts created by applications you have installed.

Allows the app to prevent the device from going to sleep.

Allows the app to request authentication tokens.

Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to read the contents of your USB storage.

Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the device, potentially including personal or private information.

معلومات عامة
نص 1.0.4.KG (11)
تحميل التسجيل 2015-02-03 05:13
حجم 48.81 MB
العربية لا
متطلبات
الروبوت 2.2+
هندسة معمارية ARM6
تحقق التطبيق
يتم إيداع الملف
إذن

Allows the app to control the vibrator.

Allows the app to read data about your contacts stored on your device, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.

Allows the app to write to the USB storage.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.

Allows the app to change the state of network connectivity.

Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.

Allows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.

Allows the app to get the list of accounts known by the device. This may include any accounts created by applications you have installed.

Allows the app to prevent the device from going to sleep.

Allows the app to receive and process SMS messages. This means the app could monitor or delete messages sent to your device without showing them to you.

Allows the app to read SMS messages stored on your device or SIM card. This allows the app to read all SMS messages, regardless of content or confidentiality.

Allows the app to request authentication tokens.

Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to read the contents of your USB storage.

Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the device, potentially including personal or private information.

Allows the app to read your device's call log, including data about incoming and outgoing calls. This permission allows apps to save your call log data, and malicious apps may share call log data without your knowledge.

Allows the app to control the vibrator.

Allows the app to read data about your contacts stored on your device, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.

Allows the app to write to the USB storage.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.

Allows the app to change the state of network connectivity.

Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.

Allows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.

Allows the app to get the list of accounts known by the device. This may include any accounts created by applications you have installed.

Allows the app to prevent the device from going to sleep.

Allows the app to receive and process SMS messages. This means the app could monitor or delete messages sent to your device without showing them to you.

Allows the app to read SMS messages stored on your device or SIM card. This allows the app to read all SMS messages, regardless of content or confidentiality.

Allows the app to request authentication tokens.

Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to read the contents of your USB storage.

Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the device, potentially including personal or private information.

Allows the app to read your device's call log, including data about incoming and outgoing calls. This permission allows apps to save your call log data, and malicious apps may share call log data without your knowledge.

معلومات عامة
نص 1.0.3.KG (10)
تحميل التسجيل 2015-01-21 23:52
حجم 48.7 MB
العربية لا
متطلبات
الروبوت 2.2+
هندسة معمارية ARM6
تحقق التطبيق
يتم إيداع الملف
إذن

Allows the app to control the vibrator.

Allows the app to read data about your contacts stored on your device, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.

Allows the app to write to the USB storage.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.

Allows the app to change the state of network connectivity.

Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.

Allows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.

Allows the app to get the list of accounts known by the device. This may include any accounts created by applications you have installed.

Allows the app to prevent the device from going to sleep.

Allows the app to receive and process SMS messages. This means the app could monitor or delete messages sent to your device without showing them to you.

Allows the app to read SMS messages stored on your device or SIM card. This allows the app to read all SMS messages, regardless of content or confidentiality.

Allows the app to request authentication tokens.

Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to read the contents of your USB storage.

Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the device, potentially including personal or private information.

Allows the app to read your device's call log, including data about incoming and outgoing calls. This permission allows apps to save your call log data, and malicious apps may share call log data without your knowledge.

Allows the app to control the vibrator.

Allows the app to read data about your contacts stored on your device, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.

Allows the app to write to the USB storage.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.

Allows the app to change the state of network connectivity.

Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.

Allows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.

Allows the app to get the list of accounts known by the device. This may include any accounts created by applications you have installed.

Allows the app to prevent the device from going to sleep.

Allows the app to receive and process SMS messages. This means the app could monitor or delete messages sent to your device without showing them to you.

Allows the app to read SMS messages stored on your device or SIM card. This allows the app to read all SMS messages, regardless of content or confidentiality.

Allows the app to request authentication tokens.

Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to read the contents of your USB storage.

Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the device, potentially including personal or private information.

Allows the app to read your device's call log, including data about incoming and outgoing calls. This permission allows apps to save your call log data, and malicious apps may share call log data without your knowledge.

معلومات عامة
نص 1.0.2.KG (9)
تحميل التسجيل 2014-12-29 12:23
حجم 48.7 MB
العربية لا
متطلبات
الروبوت 2.2+
هندسة معمارية ARM6
تحقق التطبيق
يتم إيداع الملف
إذن

Allows the app to control the vibrator.

Allows the app to read data about your contacts stored on your device, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.

Allows the app to write to the USB storage.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.

Allows the app to change the state of network connectivity.

Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.

Allows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.

Allows the app to get the list of accounts known by the device. This may include any accounts created by applications you have installed.

Allows the app to prevent the device from going to sleep.

Allows the app to receive and process SMS messages. This means the app could monitor or delete messages sent to your device without showing them to you.

Allows the app to read SMS messages stored on your device or SIM card. This allows the app to read all SMS messages, regardless of content or confidentiality.

Allows the app to request authentication tokens.

Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to read the contents of your USB storage.

Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the device, potentially including personal or private information.

Allows the app to read your device's call log, including data about incoming and outgoing calls. This permission allows apps to save your call log data, and malicious apps may share call log data without your knowledge.

Allows the app to control the vibrator.

Allows the app to read data about your contacts stored on your device, including the frequency with which you've called, emailed, or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.

Allows the app to write to the USB storage.

Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.

Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.

Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.

Allows the app to view information about network connections such as which networks exist and are connected.

Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.

Allows the app to change the state of network connectivity.

Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.

Allows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.

Allows the app to get the list of accounts known by the device. This may include any accounts created by applications you have installed.

Allows the app to prevent the device from going to sleep.

Allows the app to receive and process SMS messages. This means the app could monitor or delete messages sent to your device without showing them to you.

Allows the app to read SMS messages stored on your device or SIM card. This allows the app to read all SMS messages, regardless of content or confidentiality.

Allows the app to request authentication tokens.

Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.

Allows the app to disable the keylock and any associated password security. For example, the phone disables the keylock when receiving an incoming phone call, then re-enables the keylock when the call is finished.

Allows the app to read the contents of your USB storage.

Allows the app to read from the system's various log files. This allows it to discover general information about what you are doing with the device, potentially including personal or private information.

Allows the app to read your device's call log, including data about incoming and outgoing calls. This permission allows apps to save your call log data, and malicious apps may share call log data without your knowledge.

اهتمام! استضافت جميع الملفات تطبيقات بإذن من المؤلفين أو وجدت متاحة مجانا على شبكة الإنترنت، وإذا كان أي من الملفات ينتهك حقوقك, واسمحوا لنا أن نعرف

2014/12/31 08:21
ألعاب ذات صلة:
© 2011-2024 mob-core.com