wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

To-Do List In LISP

profile
Nareen Ansari
Jul 16, 2025
1 Like
0 Discussions
1 Reads

This program allows a user to manage a simple to-do list. The program does:

  1. Add tasks
  2. View tasks


Program:


(defvar *todo-list* '())


(defun add-task ()

(format t "Enter new task: ")

(let ((task (read-line)))

(push task *todo-list*)

(format t "Task added successfully.~%")))


(defun view-tasks ()

(if (null *todo-list*)

(format t "No tasks in the list.~%")

(progn

(format t "~%--- To-Do List ---~%")

(let ((i 1))

(dolist (task (reverse *todo-list*))

(format t "~A. ~A~%" i task)

(incf i))))))


(defun todo-menu ()

(loop

(format t "~%--- To-Do Menu ---~%")

(format t "1. Add Task~%")

(format t "2. View Tasks~%")

(format t "3. Exit~%")

(format t "Choose an option: ")

(let ((choice (read)))

(case choice

(1 (add-task))

(2 (view-tasks))

(3 (progn (format t "Exiting...~%") (return)))

(t (format t "Invalid option.~%"))))))


;; Start the to-do list manager

(todo-menu)



Output:


Comments ()


Sign in

Read Next

Socket Programming in Java

Blog banner

URL vs Domain

Blog banner

Multicore and multithreading 171

Blog banner

HubSpot

Blog banner

EID UL FITR

Blog banner

Visualization in Data Science

Blog banner

?Why Does My Breath Still Smell After Brushing?

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Memory input output management

Blog banner

What is Virtual Memory

Blog banner

Child labour

Blog banner

Direct Memory Access

Blog banner

Windows Operating System

Blog banner

Cache Memory(142)

Blog banner

How to Find the Right Therapist For Me?

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Know your Processors!

Blog banner

Data carving - using hex editor

Blog banner

Number Guessing game --lisp

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Developments in Modern Operating Systems

Blog banner

Buffering

Blog banner

Hypothesis Testing in Data Science

Blog banner

IO Buffers

Blog banner

What is Packet Filtering?

Blog banner

What is a geographic information system (GIS)?

Blog banner

Memory Partitioning

Blog banner

Beauty of indian railway

Blog banner

Elegant fashion style

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Operating system

Blog banner

Fault tolerance

Blog banner

Process in OS

Blog banner

Digital Forensics Challenges and Tools

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner