wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Note Taker App

profile
Aarti Rathod
Jul 16, 2025
0 Likes
0 Discussions
0 Reads



(defvar *notes* '()

"Global list to store text notes.")


(defun add-note ()

"Add a new text note."

(format t "Enter your note: ")

(let ((note (read-line)))

(push note *notes*)

(format t "📝 Note added: ~A~%" note)))


(defun list-notes ()

"Display all saved notes."

(if *notes*

(progn

(format t "~%📋 Your Notes:~%")

(dolist (note (reverse *notes*))

(format t "• ~A~%" note)))

(format t "📭 No notes found.~%")))


(defun clear-notes ()

"Clear all saved notes."

(setf *notes* '())

(format t "🧹 All notes cleared.~%"))


(defun show-menu ()

"Displays the options menu."

(format t "~%========= NOTE TAKER =========~%")

(format t "1. Add Note~%")

(format t "2. View Notes~%")

(format t "3. Clear Notes~%")

(format t "4. Exit~%")

(format t "Choose an option (1-4): "))


(defun note-taker ()

"Main loop for the note taker app."

(loop

(show-menu)

(let ((choice (read)))

(case choice

(1 (add-note))

(2 (list-notes))

(3 (clear-notes))

(4 (progn (format t "👋 Exiting Note Taker. Goodbye!~%") (return)))

(t (format t "❌ Invalid option. Try again.~%"))))))



Comments ()


Sign in

Read Next

Modern Operating System

Blog banner

Blockchain Security Technique

Blog banner

Ethical Hacking

Blog banner

Advantage of freedom

Blog banner

Understanding - Proof of Work!

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

Sagar Parikrama

Blog banner

WomenEmpowerment

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

Explain Kernel in OS

Blog banner

Multicore CPUs

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Disk scheduling

Blog banner

virtual machine

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Principles of Service Operation

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Memory Management

Blog banner

Lucidchart

Blog banner

Deadlock

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Memory management

Blog banner

Types of Threads

Blog banner

Pink sauce pasta

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

TRIGGERS IN DATABASE

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

LinkedIn: Watch out for these 7 upcoming updates in 2023

Blog banner

Mobile Security

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Processing Crime and Incident Scenes

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

memory cache

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Mumbai Metro 3

Blog banner

Life of a 2020-2021 student

Blog banner

Memory Management

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

The IT Service Lifecycle

Blog banner

E-learning

Blog banner