wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Game via listing method

profile
Nikita Makwana
Jul 17, 2025
0 Likes
0 Discussions
0 Reads

(defun russian-roulette ()

(let ((bullet-chamber (1+ (random 6)))

(shots 0))

(format t "Pull trigger 6 times to win!~%~%")

(loop for i from 1 to 6 do

(format t "Shot ~A/6 - Press Enter to pull trigger..." i)

(read-line)

(setf shots i)

(if (= i bullet-chamber)

(progn

(format t "BANG! You're dead at shot ~A!~%~%" i)

(return))

(format t "Click... safe!~%~%")))

(if (= shots 6)

(format t "YOU WON! Survived all 6 shots!~%")

(format t "Game over~%"))))

(russian-roulette)


Comments ()


Sign in

Read Next

Study on cyber and network forensic in computer security management

Blog banner

History of ITIL

Blog banner

Deadlock and Starvation

Blog banner

Network Security Risks

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Security and E-mail

Blog banner

Race Condition in Operating Theatre

Blog banner

Importance Of Education.

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Message Passing in OS

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

"Audit" In Data Science

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Virtualisation

Blog banner

I/O buffer and its techniques

Blog banner

Kafka - A Framework

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Expert System In AI

Blog banner

SNAPCHAT

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Importance of self defence for girls

Blog banner

Boxing

Blog banner

PERSONAL STORIES

Blog banner

Subnet Masking

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Blockchain technology: security risk and prevention

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

File Organization and Access

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

Service design process in ITSM

Blog banner

BITCOIN WALLET

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Virtual Memory

Blog banner

Health and fitness in technology

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner