Free Essay

Attack Combo

In:

Submitted By wiguna
Words 1229
Pages 5
Attack Combos

In the Pokémon games, there are many different strategies you could use to win against a clever foe. Some strategies can be used just to lay down an all-out assault on a foe, and some are more skilled and use a combination of defense and more adept move usage. Some Pokémon's heaviest hitting attacks rely on a combination of different moves, some more useful than others. This guide outlines some of those move combinations that you can use against an opponent. Use them on the right Pokémon, and they could be extremely dangerous.
True Combos
In Black & White, there are Combination Moves which are done by using two seperate moves with two of your Pokémon during Double or Triple battles. These moves will then combine and have an added extra effect. These effects vary from simple status afflictions to doing damage to the Pokémon. Only one of the Pokémon will do the damage to the Pokémon selected, but the effect will occur and lasts for several turns Grass Oath + Fire Oath | Moves Required: Grass Oath & Fire OathEffect:
When you use the move Grass Oath and then the move Fire Oath during a Double or Triple battle, the move will combine and create a field of fire which causes small amounts of damage to your opponents each turn. | | Fire Oath + Water Oath | Moves Required: Fire Oath & Water OathEffect:
When you use the move Fire Oath and then the move Water Oath during a Double or Triple battle, the move will combine and create a a rainbow over the battle area. This move increases the likelihood that any secondary effects will occur when your Pokémon use moves. | | Water Oath + Grass Oath | Moves Required: Water Oath & Grass OathEffect:
When you use the move Water Oath and then the move Grass Oath during a Double or Triple battle, the move will combine and turn the field into a swampy moor style area which lowers the speed of your opponent's Pokémon. | |
Basic Combos
In addition to the main combinations, there are numerous of other combinations spread across several turns and usable in both single and multi battles that will give you an added boost in battle. These range from doing more damage to restoring lost HP.
Belly Drum + Rest
Strategy: Use Belly Drum to max out your attack, then use Rest so that your HP becomes full once again. Works better with a Chesto Berry.
Belly Drum + Psych Up
Strategy: 2v2 only. One Pokémon uses Belly Drum, and the other one uses Psych Up to copy the max attack stat change.
Charge + Electric Attack
Strategy: Charge, then use an Electric Attack for double damage.
Cross Flame/Thunder + Cross Thunder/Flame
Strategy: If the target used the other Cross move, then the power of your move increases.
Defense Curl + Rollout
Strategy: Defense Curl first, then Rollout for x2 damage.
Dragon Dance + Physical Attack
Strategy: Dragon Dance as much as you'd like, then use the Physical Attack of your choice for powerful sweeping.
Endure + Reversal/Flail
Strategy: When you believe that your opponent is about to strike a final blow on you, use Endure so you'll survive with 1 HP. Then use Reversal/Flail for heavy hits. Works better on faster Pokémon.
Flatter + Psych Up
Strategy: Use Flatter, then Psych up to copy the upped special attack stat change and not the confusion status.
Foresight + Fighting Move
Strategy: Versus a Ghost-type Pokémon, use Foresight first, then use any Fighting Move you want to and it will hit for damage as it goes around the Ghost-type advantage completely.
Foresight + Normal Move
Strategy: Versus a Ghost-type Pokémon, use Foresight first, then use any Normal Move you want to and it will hit for damage as it goes around the Ghost-type advantage completely.
Leech Seed + Ingrain
Strategy: Leech Seed first for damage, then Ingrain for lots of HP gain. Leftovers as a held item makes this strategy work even better.
Lock On + Zap Cannon
Strategy: Using Lock On will ensure that Zap Cannon hits, which has a 50% chance of hitting normally. Zap Cannon also gives an added paralyzing bonus.
Mean Look + Perish Song
Strategy: Mean Look first, then use Perish Song. If you can survive until the turn before both Pokémon faint, then switch.
Mimic + Imprision
Strategy: Mimic whichever move you want to ban the other Pokémon from using, then Imprison it.
Mind Reader + Sheer Cold
Strategy: Using Mind Reader first ensures that Sheer Cold hits with an OHKO.
Miracle Eye + Psychic Move
Strategy: Versus a Dark-type Pokémon, use Foresight first, then use any Psychic Move you want to and it will hit for damage as it goes around the Dark-type advantage completely.
Rain Dance + Water Attack
Strategy: Rain Dance first, then use any water attack for 1.5x damage.
Rain Dance + Gale
Strategy: Rain Dance first, then use Gale for 100% accuracy.
Rain Dance + Thunder
Strategy: Rain Dance first, then use Thunder for 100% accuracy.
Rest + Sleep Talk
Strategy: Rest first, then Sleep Talk. A not-so-great strategical combo because it's random.
Rest + Snore
Strategy: Rest first, then Snore for damage. Not much to say here.
Safeguard + Thrash/Outrage/Petal Dance
Strategy: Using Safeguard first, use Thrash/Outrage/Petal Dance. At the end of those attacks, you will not get confused because of the Safeguard.
Spore + Focus Punch
Strategy: Spore, then Focus Punch. Relies a little bit on luck seeing as your opponent might wake up and attack you to disrupt Focus Punch.
Subsitute + Flail/Reversal
Strategy: Subsitute 4 times with your opponent knocking out each of them, then use Flail/Reversal for big damage. Works better on faster Pokémon.
Substitute + Focus Punch
Strategy: Subsitute first, then next turn your opposing Pokémon won't be able to directly hit you. That means that you can pull off a Focus Punch even if your opponent attacks you and hits, because the subsitute will take the hit. This works best if your Pokémon is slower than the opponents.
Sunny Day + Solar Beam
Strategy: Sunny Day first, then Solarbeam as much as you'd like with no startup phase.
Sunny Day + Synthesis/Morning Sun/Moonlight
Strategy: Use Sunny Day, then Synthesis/Morning Sun/Moonlight to restore all HP.
Sunny Day + Fire Attack
Strategy: Sunny Day, then use any Fire attack for 1.5x damage.
Stat Up Move + Baton Pass
Strategy: Use any move to increase your Pokémon's status, then use Baton Pass to give those changes to any other Pokémon of your choice.
Swagger + Psych Up
Strategy: Use Swagger to confuse your opponent, then use Psych Up to copy the upped attack but not the confusion.
Swagger + Screech
Strategy: Use Swagger, then use Screech to move the defense of the opponent down as much as you'd like to greatly increase the damage taken when they hit themselves in their confusion. Works well in conjunction with attacking moves as well.
Toxic + Dig/Fly/Dive/Bounce
Strategy: Use Toxic, then use Fly continuously to make opponents hit half of the time. Doesn't work well if your opponent has something to hit you in the air/ground though.
Toxic + Protect/Detect
Strategy: Toxic first, then just keep using Protect or Detect. Not much else to say here.
Weather + Weather Ball
Strategy: Using a weather move and then Weather Ball will result in Weather Ball changing type to match the weather.

Similar Documents

Free Essay

Janelle.Doria

...Billy Collins And All That Jazz: An Essay by J.Doria You can’t read Billy Collins’ poems without considering their background music, which, like his comic and physically impaired mice, perforates his words and timbre of his poetry, a distant accompaniment, a soundtrack to his verses. The central focus here will be Many Faces of Jazz from Picnic, Lightning with reference to some other works fromQuestions of Angels, The Apple that Astonished Paris and The Art of Drowning. Billy Collins has said that he likes to be alone with his reader, creating a very personal and intimate link between ourselves and the poet. Reading is a singular act and Collins makes full advantage of this. Not only does he seduce the reader by his profoundly simple yet enchanting verse, he shares his love of music as well, almost gifting us with a mixed tape ranging from classical to jazz to the blues to a track on the radio. In this poem, The Many Faces of Jazz, Collins reflects on our complicated relationship with this genre of music which he clearly loves “and, most essential, the whole/head furiously,/ yet almost imperceptibly nodding/ in total and absolute agreement.” The poem takes you into a smoky, hazy jazz bar perhaps by invitation where we watch an audience. Jazz can be a musical estrangement of sorts. It jars. Tempos can be jagged and ragged. It refuses to soar with Beethovian swells, climaxing gloriously and unforgivingly. We feel we should ‘understand’ it but don’t. One almost feels uneducated...

Words: 1417 - Pages: 6

Free Essay

Review of "This Is England"

...obly black skinhead in the group. Everyone accepts Shaun as a member, except Tubb who feels that Shaun is taking his place. But soon after the problem is solved between them and Shaun feels better than ever between his new friends, also the older girl Smell he feels attracted to. Then the older skinhead named Combo, with racist views, returns to the group after a prison sentence, together with two friends. He tries to take the leadership of the group from Woody, which leads to a rift. Woody stays leader of the apolitical group, whilst Combo becomes leader of the new political group. Combo likes Shaun and identifies with him, who in turn sees Combo as a role model. They go to a White Nationalist meeting and on their way back, a member gets thrown out because of his doubt over the group’s racist and national politics. After being rejected by the girl he is in love with, Combo buys drugs from Milky to comfort himself and haves a party, together with Shaun, Milky and his two friends. He asks Milky about his family, but keeps getting more and more jealous, when Milky tells about his big lovely “black” family. When he invites him to a family dinner it becomes too much for Combo, who beats Milky until he is unconscious, whilst one of the...

Words: 925 - Pages: 4

Free Essay

Program

...system aims to provide a secure, accurate and easy way to display train ticket rates. This project is developed in Visual Basic 6.0. This Railway Ticket Rate Viewer should be able to show different ticket rates for each destination. Using this, the Ticket Counter person can perform operation like finding out the costs of each ticket. User Interface and Coding 1. Create this user interface ← Form: - Change the BackColor into Blue - Change the Caption into “Northwest Indiana Railroad” ← Adding Picture: - Click the PictureBox on the toolbar. Drag and release it into the form. Double-Click it, locate the picture you want and select it. ← Combo Box: - Change the text into “Choose your Destination” ← Frame: - Change the caption into “Please Select” ← Option Button - Make 4 option buttons and rename it into: - Single - Ten - Monthly - Yearly 2. Now, enter these codes inside the Form_load 3. Enter these codes inside the Enter event 4. Enter these codes inside the Quit event Testing 1. After you’ve done all the procedures, click F5 to test whether your program is working properly. 2. If not, debug your program and then test it again. Saving as an .EXE file ...

Words: 354 - Pages: 2

Free Essay

Accounting Information System

...appropriately, with almost the same name, for example Bookings Mainform Bookings Subform Next validate that you can enter a booking for an existing customer booking a site. Consider the data the user enters and the data supplied by the system. choose a Customer and enter a site ID choose a date enter a duration Delete the Bookings label in the subform as it takes up too much space. The end result should be to make the subform show as many records as possible, or in other words it should take up the majority of the form. Position the fields in both the mainform and subform to take up less space. Creating a drop-down list (combo box) to select a site Rather than type in a Site ID in the subform the user should be able to select a site from a drop-down list, which is more user friendly and avoids typing errors by the user. In design view of the subform drag a combo box from the Design ribbon into the Detail section of the subform choose look up the values in a table query choose the Sites table include the Site ID, the type of site and the Rate...

Words: 431 - Pages: 2

Free Essay

Sample Grade Sheet

...first stop combo box blank and press Calculate ______You should get an error message saying you must enter a first city (-3 if not) ______Program should NOT blow up after error message (-3 if it does). Leave the second stop combo box blank and press Calculate ______You should get an error message saying you must enter a second city (-3 if not) ______Program should NOT blow up after error message (-3 if it does). Select Chicago as the first stop, Dallas as the second stop, and press calculate _____ Label next to first leg mileage should say “Austin to Chicago Mileage” (-2) _____ Austin to Chicago mileage should be 1,120. (-3) (-1 if not formatted with comma) _____ Label next to second leg mileage should say “Chicago to Dallas Mileage” (-2) _____ Chicago to Dallas mileage should be 921. (-3) (-1 if not formatted with comma) _____ Label next to third leg mileage should say “Dallas to Austin Mileage” (-2) _____ Dallas to Austin mileage should be 195. (-3) _____ Total mileage should be 2,236 (-3) (-1 if not formatted with comma) _____ Price per mile should be $0.19 (-3) (-1 if not formatted as currency) _____Trip amount should be $419.25 (-3) (-1 if not formatted as currency) Select Miami as the first stop and Los Angeles as the second stop. Change price per gallon to 4 and MPG to 22. Press calculate. _____Total mileage should be 5,443 (-3) _____ Price per mile should be $0.18 (-2) _____Trip amount should be $989.64 (-3) Press Clear _____First stop combo box should...

Words: 399 - Pages: 2

Free Essay

The Big Combo Essay

...five, and six in our class book Film Art: An Introduction we learn the fundamentals of film; mise-en-scene, editing, and cinematography. Both mise-en-scene, editing, and cinematography deal with what is happening inside of the film frame, this includes the setting, costume, lighting, framing, photographic aspects, characters, editing, and cuts of the shot. Together these specific fundamental elements partake in the films that we watch providing dimension, mood, and style. The Big Combo is the epitome of film noir. Film noir’s visual style conceives a mood in a film with instability, double identities, and somewhat shifting values by using it’s techniques of darkness in shadows and night time scenes. In The Big Combo the main characters seem to have double identities “shadowed” upon them throughout the movie through silhouettes, shadows, and reflections, and not only do they have these double identities through mise-en-scene but also in the narrative. In the opening hospital sequence in The Big Combo, just as detective Diamond comes up the stairs and through the door we have a horizontal angle very slightly looking up (a low angle) into the hallway. As detective Diamond steps into the door past the officer the camera angle stays the same, both Mr. Diamond and the standing officer are in medium long shot. With the medium long shot we are able to make out the two nurses and reception desk in the back. In the hallway of the hospital the high-key lighting makes the contrast between...

Words: 949 - Pages: 4

Free Essay

Philosophy

...G062 Similar but Different Answers – 2014-15 CONTENTS INTRODUCTION ............................................................................................................................... 3 Task 1 – RELATIONAL DATABASE .................................................................................................... 4 1ai – Import data..................................................................................................................... 4 1aii – Relationships ................................................................................................................. 6 1bi – Church form ................................................................................................................... 7 1bii – Campers form................................................................................................................ 8 1biii – Camper photographs ................................................................................................... 9 1biv – Church details on Camper form ................................................................................. 11 1ci – Booking form ................................................................................................................ 14 1cii – Booking form annotation ............................................................................................ 15 1di – Adult campers report ........................................................................................

Words: 4923 - Pages: 20

Premium Essay

Warrior (Sword Master) Builds Guide

...AoE (area of effect) and crowd control with fast paced damage per second. This class has little team support, but what it does have is a very good buff for dungeon runs with other people (which people ask for in parties). Overall, this class is very versatile, being great in both pve and pvp. Sword Master really shines as a Dark element fighter. We are not sure why, but in pvp, Magic Defense and Physical Defense do not work. Therefore, most people rely on elements to deal damage. Skills that are affected by Dark element: Warrior: Heavy Slash, Rising Slash, Circle Break Sword Master: Triple Slash, Deep Straight, Hacking Stance, Line Drive, Infinity Edge (only part of it), Hemorrahage, Eclipse, Half Moon Slash, Aerial Combo, Counter Slash, Dash Slash, Dash Combo With this in mind, you can see why Sword Master is best as Dark element. With this element, you will be doing lots and lots of damage in both pve and pvp. The best equipment sets for Sword Master/MoonLord are the Apocalypse and Manticore set. They give Dark %. Alright, now onto some builds: First build we have is the Magic Hybrid. Even though going either magic or physical is all fine and dandy, if you don’t have a variety of skills you’re going to end up running around waiting for cooldowns. Sword Masters utilize two skill bars by using the ~ button (toggles between your first and second skill bar). If you cannot handle this maneuver, then it’s best to go complete Magic or...

Words: 1656 - Pages: 7

Free Essay

Plag Check

...seven Domains that make-up the firms IT infrastructure. Secondly, proposed security measures and controls for headquarters and each branch office. Keeping information assets secure is challenging for any business, regardless of its size. It seems there's no limit to the ingenuity and maliciousness of today's cybercriminals, hackers and identity thieves. In fact, hackers have become so sophisticated and organized that their operational methods are similar to those of traditional software development and business practices(Symantec 2008). What's more, while yesterday's attack activity consisted of a single compromise aimed at gaining access to the data on a computer, current attack techniques are multi-staged. Hackers use their initial compromise to establish a beachhead from which they can launch subsequent attacks. With an estimated 1.25 billion Internet users worldwide, according to Computer Economics, cybercriminals have never had a bigger pool of potential victims from...

Words: 866 - Pages: 4

Free Essay

Fruma

...|Recovery Spd +2 |Red part of health bar recovers fastest. | | | | | | |Recovery Spd +1 |Red part of health bar recovers faster. | | | | | | |Recovery Spd -1 |Red part of health bar recovers slower. | | | | | | |Recovery Spd -2 |Red part of health bar recovers slowest. | | | | | |Attack |Attack Up (L) |Large attack increase. | | | | | |...

Words: 2499 - Pages: 10

Premium Essay

Casual Wear

...The unexpected outcome provides the reader with the fierce shock of reality on a personal level. Since the only name given to the woman is “wife” and the odds were “1 to 910 against her strolling past the Embassy,” the reader is given the impression that this is something that could happen to anyone, anywhere (Merrill 907). The shift in tone from detached to very personal provides the reader with the stark contrast between a generalized newscast and the very personal level on which people are affected by the events being covered. The events that make the news, however, have a different effect on different individuals, which Merrill suggests in the last two lines of “Casual Wear.” In line eleven, Merrill provides the outcome of the attack for both the terrorist and the tourist; the terrorist is left with the satisfaction of “claiming responsibility,” while...

Words: 603 - Pages: 3

Premium Essay

Ais Attack

...used to access online accounts. He also admitted to impersonating payroll officers in conversations he had with ADP, which is based in New Jersey. The case resulted from a collaboration between the banks and the Federal Bureau of Investigation against Nwaki, a.k.a. Shawn Conley, who was arrested in December on charges of wire fraud conspiracy, wire fraud, aggravated identity theft, and conspiracy to gain unauthorized access to computers. Each count, to which Nwaki pleaded guilty, carries a maximum sentence of 20 years in prison and a maximum fine of $250,000; sentencing is set for Aug. 15, 2012. According to court records, Nwaki and six co-conspirators, between August 2000 and June 2010, worked across three continents to launch phishing attacks through spoofed websites designed to mimic banks and payroll processors such as ADP. When online users visited the spoofed pages, they were asked to provide confidential personal and financial information, such as dates of birth, Social Security numbers, mothers' maiden names, and online account user names and passwords. Having obtained log-in credentials and answers to commonly-asked security questions, the hackers accessed online accounts to make unauthorized transfers to accounts they controlled and/or wired...

Words: 1059 - Pages: 5

Free Essay

Snyder V. Phelps

...Phelps 1. The Court holds that the picketing pertained to a matter of “Public concern” because members of the Westboro church basically attacked this funeral. Family members were grieving the loss of their son, their soldier that was killed in Iraq, giving his own life for his country. And the members of this church were throwing verbal attacks, not counting with all the signs they took showing how they hate soldiers because of the homosexuality existing in the service, not having idea that it was the case for this deceased soldier. The fact here is that this was a public matter, because it interrupted the community peace and those are subjects that society (public) are concern in every day basis. 2. A captive audience is a group of people who listen or to watch someone or something because they cannot leave. 3. Because he could not agree with the Court and what the Court rely on. Westboro Church caused this father great pain and the Court denies him for what he suffered. Westboro Church was addressing public issues, but that is different than attacking a person when they are in pain for the loss of a son. He was a victim of their attack. Page 178 Case 6.2 Brown v. Entertainment merchants Association 1. The issue before the Court was the sale of certain violent video games to children without parent’s permission. These video games have violence; killing, and pornography, enemies with weapons, using explosives to destroy structures, dangerous races with cars becoming...

Words: 411 - Pages: 2

Premium Essay

Week 1 Is 4560

...internet security. The three current major ones are health care, education and government. Healthcare, education, and government accounted for nearly two-thirds of all identities breached in 2012. More than 88 percent of attacks that are known are those performed by people outside those companies that are being attacked. Some of these attacks are very well planned and obviously an inside job there are examples given in the article about how people in the military have sent messages to others that have malware attached in them. According to the article web based attacks have increased by nearly 33 percent and it is continuing to grow. Health care in particular is a major threat since it contains so much personal data with all of the patient information that there is. Education counties to be a treat year after year due to the number of schools and information that can be accessed since most schools do not have the security that most major corporations have and last but definitely not leas is the government for so many reasons will always be a threat whether it is out of hate or just monetary gain the government will always have a target on its back. As time goes on and since we are still so new to the World Wide Web there will be even more sophisticated attacks planed and made every day, but so is security. at its current pace hackers seem to usually be one step ahead of the agencies that they are attacking however because of how much attention hackers are getting now because of...

Words: 314 - Pages: 2

Premium Essay

Ping Sweeps

...port scans are examples of the threats that most organizations are likely to face. These two probes are the two major and fundamental ways through which hackers and crackers will assess the vulnerabilities of our infrastructure and design a plan to break in (Baskin, 2008). It is important that our organization understands the two primary attacks and their approach so that we can prevent them from taking place and proactively mitigate our risk of attack. Our competitive world and fast-paced market dictates that we effectively decrease our exposure to cyber attacks to protect the integrity of our data and infrastructure due to attack resulting from port scans or ping sweeps. The term “ping sweep” is a process that involves the attacker learning more about the functioning of our existing systems. For instance, if an attacker attempts to breach our servers, he or she will be able to detect if the system is active by performing a ping sweep. This will likely be an attacker’s first step in their attempts to probe our organization for vulnerabilities. The results of the ping sweep will assist the attacker to identify possible points of attack and available targets. After this process has been noted, the attacker will then apply some more measures so as to identify the security codes that are used in the organization (Graves, 2007). Once someone has an access to the security codes of an organization, the organization is extremely vulnerable and significantly compromised....

Words: 774 - Pages: 4