wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

To-Do List In LISP

profile
Nareen Ansari
Jul 16, 2025
1 Like
0 Discussions
0 Reads

This program allows a user to manage a simple to-do list. The program does:

  1. Add tasks
  2. View tasks


Program:


(defvar *todo-list* '())


(defun add-task ()

(format t "Enter new task: ")

(let ((task (read-line)))

(push task *todo-list*)

(format t "Task added successfully.~%")))


(defun view-tasks ()

(if (null *todo-list*)

(format t "No tasks in the list.~%")

(progn

(format t "~%--- To-Do List ---~%")

(let ((i 1))

(dolist (task (reverse *todo-list*))

(format t "~A. ~A~%" i task)

(incf i))))))


(defun todo-menu ()

(loop

(format t "~%--- To-Do Menu ---~%")

(format t "1. Add Task~%")

(format t "2. View Tasks~%")

(format t "3. Exit~%")

(format t "Choose an option: ")

(let ((choice (read)))

(case choice

(1 (add-task))

(2 (view-tasks))

(3 (progn (format t "Exiting...~%") (return)))

(t (format t "Invalid option.~%"))))))


;; Start the to-do list manager

(todo-menu)



Output:


Comments ()


Sign in

Read Next

Smartsheet

Blog banner

A buffer overflow

Blog banner

Man VS Nature

Blog banner

Memory Management - operating system

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Harsh Rathod

Blog banner

SAVE TREES

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

In the world of Technology...

Blog banner

Artificial Intelligence (AI)

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Elegant fashion style

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Ransomware

Blog banner

Sage

Blog banner

RAID

Blog banner

Answer

Blog banner

Types of Hackers.

Blog banner

Microsoft Windows Overview

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Computer Security

Blog banner

OPERATING SYSTEM

Blog banner

How social media affect

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Place to visit in pune

Blog banner

Evolution of the Microprocesor

Blog banner

Hosting basics

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Decision Tree: A Diagram Model

Blog banner

Deadlock and starvation in operating system

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

SPEM

Blog banner

Models of Information Security.

Blog banner

Direct Memory Access

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

OLA

Blog banner

Cyber Security Control

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Memory Management

Blog banner