wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

To-Do List In LISP

profile
Nareen Ansari
Jul 16, 2025
1 Like
0 Discussions
1 Reads

This program allows a user to manage a simple to-do list. The program does:

  1. Add tasks
  2. View tasks


Program:


(defvar *todo-list* '())


(defun add-task ()

(format t "Enter new task: ")

(let ((task (read-line)))

(push task *todo-list*)

(format t "Task added successfully.~%")))


(defun view-tasks ()

(if (null *todo-list*)

(format t "No tasks in the list.~%")

(progn

(format t "~%--- To-Do List ---~%")

(let ((i 1))

(dolist (task (reverse *todo-list*))

(format t "~A. ~A~%" i task)

(incf i))))))


(defun todo-menu ()

(loop

(format t "~%--- To-Do Menu ---~%")

(format t "1. Add Task~%")

(format t "2. View Tasks~%")

(format t "3. Exit~%")

(format t "Choose an option: ")

(let ((choice (read)))

(case choice

(1 (add-task))

(2 (view-tasks))

(3 (progn (format t "Exiting...~%") (return)))

(t (format t "Invalid option.~%"))))))


;; Start the to-do list manager

(todo-menu)



Output:


Comments ()


Sign in

Read Next

PHISHING

Blog banner

Gamer life

Blog banner

virtual machine

Blog banner

Self managing devices

Blog banner

Loneliness

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

How Much Protein Do You Really Need Every Day?

Blog banner

Explain the concept of ( MIS) Management information systems

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Explain website hacking issues

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

Mumbai

Blog banner

URL vs Domain

Blog banner

Virtual Machine

Blog banner

Process State

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Multicore and Multithreading

Blog banner

Data Exfiltration

Blog banner

Brain wash of social media

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

Memory management and virtual memory

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

An Overivew Of Cache Memory

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Artificial Intelligence and I

Blog banner

Benefits and drawback of web security.

Blog banner

Balance

Blog banner

Memory

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Dr. Venkadavarahan

Blog banner

Virtual Memory

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Introduction my self

Blog banner

AOL Mail

Blog banner

Synchronization

Blog banner