wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Note Taker App

profile
Aarti Rathod
Jul 16, 2025
0 Likes
0 Discussions
0 Reads



(defvar *notes* '()

"Global list to store text notes.")


(defun add-note ()

"Add a new text note."

(format t "Enter your note: ")

(let ((note (read-line)))

(push note *notes*)

(format t "πŸ“ Note added: ~A~%" note)))


(defun list-notes ()

"Display all saved notes."

(if *notes*

(progn

(format t "~%πŸ“‹ Your Notes:~%")

(dolist (note (reverse *notes*))

(format t "β€’ ~A~%" note)))

(format t "πŸ“­ No notes found.~%")))


(defun clear-notes ()

"Clear all saved notes."

(setf *notes* '())

(format t "🧹 All notes cleared.~%"))


(defun show-menu ()

"Displays the options menu."

(format t "~%========= NOTE TAKER =========~%")

(format t "1. Add Note~%")

(format t "2. View Notes~%")

(format t "3. Clear Notes~%")

(format t "4. Exit~%")

(format t "Choose an option (1-4): "))


(defun note-taker ()

"Main loop for the note taker app."

(loop

(show-menu)

(let ((choice (read)))

(case choice

(1 (add-note))

(2 (list-notes))

(3 (clear-notes))

(4 (progn (format t "πŸ‘‹ Exiting Note Taker. Goodbye!~%") (return)))

(t (format t "❌ Invalid option. Try again.~%"))))))



Comments ()


Sign in

Read Next

Positioning: The battle of the minds

Blog banner

Power of words

Blog banner

Device driver

Blog banner

ADIDAS

Blog banner

Embedding a Youtube video on Wisemonkeys

Blog banner

Big Data Architecture

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

Wreck

Blog banner

Memory input output management

Blog banner

Corporate Discipline.

Blog banner

What is OS Fingerprinting?

Blog banner

american greatines

Blog banner

The Sunny Side of Instagram

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Memory Management

Blog banner

Beatbox

Blog banner

CRISP-DM Methodology

Blog banner

Service tax applied on sanitary pads and not condoms

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Service Catalogue Management

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

SQL Injection

Blog banner

Service Strategy In ITSM

Blog banner

JIRA SOFTWARE

Blog banner

MySQL

Blog banner

"Life as a Part-time Student"

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Fitness regime by Deepesh

Blog banner

Caching windows

Blog banner

Odoo

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Cache memory

Blog banner

What is Amazon?

Blog banner

JUSTICE FOR EVERY β€œBEZUBAAN ANIMAL”

Blog banner

Concurrency and memory

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner