wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Note Taker App

profile
Aarti Rathod
Jul 16, 2025
0 Likes
0 Discussions
0 Reads



(defvar *notes* '()

"Global list to store text notes.")


(defun add-note ()

"Add a new text note."

(format t "Enter your note: ")

(let ((note (read-line)))

(push note *notes*)

(format t "📝 Note added: ~A~%" note)))


(defun list-notes ()

"Display all saved notes."

(if *notes*

(progn

(format t "~%📋 Your Notes:~%")

(dolist (note (reverse *notes*))

(format t "• ~A~%" note)))

(format t "📭 No notes found.~%")))


(defun clear-notes ()

"Clear all saved notes."

(setf *notes* '())

(format t "🧹 All notes cleared.~%"))


(defun show-menu ()

"Displays the options menu."

(format t "~%========= NOTE TAKER =========~%")

(format t "1. Add Note~%")

(format t "2. View Notes~%")

(format t "3. Clear Notes~%")

(format t "4. Exit~%")

(format t "Choose an option (1-4): "))


(defun note-taker ()

"Main loop for the note taker app."

(loop

(show-menu)

(let ((choice (read)))

(case choice

(1 (add-note))

(2 (list-notes))

(3 (clear-notes))

(4 (progn (format t "👋 Exiting Note Taker. Goodbye!~%") (return)))

(t (format t "❌ Invalid option. Try again.~%"))))))



Comments ()


Sign in

Read Next

Save Girl Child

Blog banner

MY FIRST BLOG?

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

What is Minting & Mining

Blog banner

Security Issues and Countermeasures

Blog banner

Deadlock

Blog banner

All you need to know about “On-page SEO”

Blog banner

GOOGLE

Blog banner

Go Daddy

Blog banner

What is Network Security?

Blog banner

I/O Buffering

Blog banner

Worms, viruses and Bots

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Pandas Matrix Applications

Blog banner

Deadlock

Blog banner

Email Privacy

Blog banner

OS Assignment 3 Deadlock

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Gamer life

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Beatbox

Blog banner

Regression Analysis

Blog banner

Visualization in Data Science

Blog banner

Theads

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Record Blocking

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

File Management

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Ethical Hacking

Blog banner

PYTHON

Blog banner

Virtual Memory

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Evolution of the Microprocesor

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Animal’s have my heart

Blog banner

Proton mail

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Different memory allocation strategies

Blog banner

Characteristics of Etherum

Blog banner

Uniprocessor scheduling

Blog banner