- The snippets are under the CC-BY-SA license.
- Please consider keeping a bookmark
- (instead of printing)
Lua | |||
---|---|---|---|
1 |
Print a literal string on standard output
|
||
2 |
Loop to execute some code a constant number of times
|
|
|
3 |
Like a function which doesn't return any value, thus has only side effects (e.g. Print to standard output)
|
||
4 |
Create a function which returns the square of an integer
|
||
5 |
Declare a container type for two floating-point numbers x and y
|
||
6 |
Do something with each item x of the list (or array) items, regardless indexes.
|
||
7 |
Print each index i with its value x from an array-like collection items
|
||
8 |
Create a new map object x, and provide some (key, value) pairs as initial content.
|
|
|
9 |
The structure must be recursive because left child and right child are binary trees too. A node has access to children nodes, but not to its parent.
|
||
10 |
Generate a random permutation of the elements of list x
|
|
|
11 |
The list x must be non-empty.
|
||
12 |
Check if the list contains the value x.
list is an iterable finite container. |
||
13 |
Access each key k with its value x from an associative array mymap, and print them.
|
||
14 |
Pick a random number greater than or equals to a, strictly inferior to b. Precondition : a < b.
|
|
|
15 |
Pick a random integer greater than or equals to a, inferior or equals to b. Precondition : a < b.
|
||
16 |
Call a function f on every node of binary tree bt, in depth-first infix order
|
||
17 |
The structure must be recursive. A node may have zero or more children. A node has access to its children nodes, but not to its parent.
|
||
19 |
Reverse the order of the elements of the list x.
This may reverse "in-place" and destroy the original ordering. |
Alternative implementation:
|
|
20 |
Implement a function search which looks for item x in a 2D matrix m.
Return indices i, j of the matching cell. Think of the most idiomatic way in the language to return the two values at the same time. |
||
21 |
Swap the values of the variables a and b
|
||
22 |
Extract the integer value i from its string representation s (in radix 10)
|
|
|
23 |
Given a real number x, create its string representation s with 2 decimal digits following the dot.
|
||
24 |
Declare a new string s and initialize it with the literal value "ネコ" (which means "cat" in japanese)
|
||
26 |
Declare and initialize a matrix x having m rows and n columns, containing real numbers.
|
|
|
27 |
Declare and initialize a 3D array x, having dimensions boundaries m, n, p, and containing real numbers.
|
||
28 |
Sort the elements of the list (or array-like collection) items in ascending order of x.p, where p is a field of the type Item of the objects in items.
|
||
29 |
Remove i-th item from list items.
This will alter the original list or return a new list, depending on which is more idiomatic. Note that in most languages, the smallest valid value for i is 0. |
|
|
31 |
Create the recursive function f which returns the factorial of the non-negative integer i, calculated from f(i-1)
|
||
32 |
Create function exp which calculates (fast) the value x power n.
x and n are non-negative integers. |
||
35 |
Implement a function compose (A -> C) with parameters f (A -> B) and g (B -> C), which returns the composition function g ∘ f
|
|
|
36 |
Implement a function compose which returns composition function g ∘ f for any functions f and g having exactly 1 parameter.
|
|
|
37 |
Transform a function that takes multiple arguments into a function for which some of the arguments are preset.
|
Alternative implementation:
|
|
38 |
Find substring t consisting in characters i (included) to j (excluded) of string s.
Character indices start at 0 unless specified otherwise. Make sure that multibyte characters are properly handled. |
|
|
39 |
Set the boolean ok to true if the string word is contained in string s as a substring, or to false otherwise.
|
||
41 |
Create the string t containing the same characters as the string s, in reverse order.
The original string s must remain unaltered. Each character must be handled correctly regardless its number of bytes in memory. |
|
|
43 |
Look for a negative value v in 2D integer matrix m. Print it and stop searching.
|
|
|
44 |
Insert the element x at position i in the list s. Further elements must be shifted to the right.
|
||
45 |
Sleep for 5 seconds in current thread, before proceeding with the next instructions.
|
Alternative implementation:
|
|
46 |
Create the string t consisting of the 5 first characters of the string s.
Make sure that multibyte characters are properly handled. |
||
48 |
Assign to variable s a string literal consisting in several lines of text, including newlines.
|
||
49 |
Build list chunks consisting in substrings of the string s, separated by one or more space characters.
|
||
50 |
Write a loop that has no end clause.
|
||
51 |
Determine whether the map m contains an entry for the key k
|
||
53 |
Concatenate elements of string list x joined by the separator ", " to create a single string y.
|
||
54 |
Calculate the sum s of the integer list or array x.
|
|
|
55 |
Create the string representation s (in radix 10) of the integer value i.
|
||
57 |
Create the list y containing the items from the list x that satisfy the predicate p. Respect the original ordering. Don't modify x in-place.
|
||
58 |
Create the string lines from the content of the file with filename f.
|
||
59 |
Print the message "x is negative" to standard error (stderr), with integer x value substitution (e.g. "-2 is negative").
|
||
60 |
Assign to x the string value of the first command line parameter, after the program name.
|
||
61 |
Assign to the variable d the current date/time value, in the most standard type.
|
||
62 |
Set i to the first position of string y inside string x, if exists.
Specify if i should be regarded as a character index or as a byte index. Explain the behavior when y is not contained in x. |
||
63 |
Assign to x2 the value of string x with all occurrences of y replaced by z.
Assume occurrences of y are not overlapping. |
||
65 |
From the real value x in [0,1], create its percentage string representation s with one digit after decimal point. E.g. 0.15625 -> "15.6%"
|
||
69 |
Use seed s to initialize a random generator.
If s is constant, the generator output will be the same each time the program runs. If s is based on the current value of the system clock, the generator output will be different each time. |
||
70 |
Get the current datetime and provide it as a seed to a random generator. The generator sequence will be different at each run.
|
||
71 |
Basic implementation of the Echo program: Print all arguments except the program name, separated by space, followed by newline.
The idiom demonstrates how to skip the first argument if necessary, concatenate arguments as strings, append newline and print it to stdout. |
|
|
74 |
Compute the greatest common divisor x of big integers a and b. Use an integer type able to handle huge numbers.
|
||
76 |
Create the string s of integer x written in base 2.
E.g. 13 -> "1101" |
|
|
78 |
Execute a block once, then execute it again as long as boolean condition c is true.
|
||
79 |
Declare the floating point number y and initialize it with the value of the integer x .
|
||
80 |
Declare integer y and initialize it with the value of floating point number x . Ignore non-integer digits of x .
Make sure to truncate towards zero: a negative x must yield the closest greater integer (not lesser). |
|
|
81 |
Declare the integer y and initialize it with the rounded value of the floating point number x .
Ties (when the fractional part of x is exactly .5) must be rounded up (to positive infinity). |
|
|
83 |
Declare the regular expression r matching the strings "http", "htttp", "httttp", etc.
|
||
85 |
Write boolean function addingWillOverflow which takes two integers x, y and return true if (x+y) overflows.
An overflow may be above the max positive value, or below the min negative value. |
||
87 |
Exit immediately.
If some extra cleanup work is executed by the program runtime (not by the OS itself), describe it. |
|
|
89 |
You've detected that the integer value of argument x passed to the current function is invalid. Write the idiomatic way to abort the function execution and signal the problem.
|
||
90 |
Expose a read-only integer x to the outside world while being writable inside a structure or a class Foo.
|
Alternative implementation:
|
|
91 |
Read from the file data.json and write its content into the object x.
Assume the JSON data is suitable for the type of x. |
||
92 |
Write the contents of the object x into the file data.json.
|
||
93 |
Implement the procedure control which receives one parameter f, and runs f.
|
||
94 |
Print the name of the type of x. Explain if it is a static type or dynamic type.
This may not make sense in all languages. |
||
96 |
Set the boolean b to true if string s starts with prefix prefix, false otherwise.
|
Alternative implementation:
|
|
97 |
Set boolean b to true if string s ends with string suffix, false otherwise.
|
||
99 |
Assign to the string x the value of the fields (year, month, day) of the date d, in format YYYY-MM-DD.
|
||
100 |
Sort elements of array-like collection items, using a comparator c.
|
||
105 |
1
|
|
|
106 |
Assign to string dir the path of the working directory.
(This is not necessarily the folder containing the executable itself) |
||
107 |
Assign to string dir the path of the folder containing the currently running executable.
(This is not necessarily the working directory, though.) |
||
108 |
Print the value of variable x, but only if x has been declared in this program.
This makes sense in some languages, not all of them. (Null values are not the point, rather the very existence of the variable.) |
||
110 |
Set the boolean blank to true if the string s is empty, or null, or contains only whitespace ; false otherwise.
|
||
111 |
From current process, run program x with command-line parameters "a", "b".
|
||
112 |
Print each key k with its value x from an associative array mymap, in ascending order of k.
|
|
|
116 |
Remove all occurrences of string w from string s1, and store the result in s2.
|
||
117 |
Set n to the number of elements of the list x.
|
|
|
118 |
Create the set y from the list x.
x may contain duplicates. y is unordered and has no repeated values. |
|
|
119 |
Remove duplicates from the list x.
Explain if the original order is preserved. |
||
120 |
Read an integer value from the standard input into the variable n
|
|
|
122 |
Create an enumerated type Suit with 4 possible values SPADES, HEARTS, DIAMONDS, CLUBS.
|
||
123 |
Verify that predicate isConsistent returns true, otherwise report assertion violation.
Explain if the assertion is executed even in production environment or not. |
||
126 |
Write a function foo that returns a string and a boolean value.
|
||
131 |
Execute f1 if condition c1 is true, or else f2 if condition c2 is true, or else f3 if condition c3 is true.
Don't evaluate a condition when a previous condition was true. |
||
133 |
Set boolean ok to true if string word is contained in string s as a substring, even if the case doesn't match, or to false otherwise.
|
Alternative implementation:
|
|
134 |
Declare and initialize a new list items, containing 3 elements a, b, c.
|
||
137 |
Set the boolean b to true if the string s contains only characters in the range '0'..'9', false otherwise.
|
||
138 |
Create a new temporary file on the filesystem.
|
||
140 |
Delete from map m the entry having key k.
Explain what happens if k is not an existing key in m. |
||
142 |
Assign to string s the hexadecimal representation (base 16) of integer x.
E.g. 999 -> "3e7" |
||
150 |
Remove the last character from the string p, if this character is a forward slash /
|
|
|
151 |
Remove last character from string p, if this character is the file path separator of current platform.
Note that this also transforms unix root path "/" into the empty string! |
||
152 |
Create string s containing only the character c.
|
||
153 |
Create the string t as the concatenation of the string s and the integer i.
|
||
154 |
Find color c, the average between colors c1, c2.
c, c1, c2 are strings of hex color codes: 7 chars, beginning with a number sign # . Assume linear computations, ignore gamma corrections. |
||
155 |
Delete from filesystem the file having path filepath.
|
|
|
156 |
Assign to the string s the value of the integer i in 3 decimal digits. Pad with zeros if i < 100. Keep all digits if i ≥ 1000.
|
||
157 |
Initialize a constant planet with string value "Earth".
|
||
159 |
Define a Trie data structure, where entries have an associated value.
(Not all nodes are entries) |
||
161 |
Multiply all the elements of the list elements by a constant c
|
||
165 |
Assign to the variable x the last element of the list items.
|
||
166 |
Create the list ab containing all the elements of the list a, followed by all the elements of the list b.
|
Alternative implementation:
|
|
167 |
Create the string t consisting of the string s with its prefix p removed (if s starts with p).
|
||
168 |
Create string t consisting of string s with its suffix w removed (if s ends with w).
|
|
|
169 |
Assign to the integer n the number of characters of the string s.
Make sure that multibyte characters are properly handled. n can be different from the number of bytes of s. |
Alternative implementation:
|
|
170 |
Set n to the number of elements stored in mymap.
This is not always equal to the map capacity. |
|
|
171 |
Append the element x to the list s.
|
||
175 |
From the array a of n bytes, build the equivalent hex string s of 2n digits.
Each byte (256 possible values) is encoded as two hexadecimal characters (16 possible values per digit). |
|
|
182 |
Output the source of the current program. A quine is a computer program that takes no input and produces a copy of its own source code as its only output.
Reading the source file from disk is cheating. |
||
186 |
Exit a program cleanly indicating no error to OS
|
|
|
193 |
Declare two two-dimensional arrays a and b of dimension n*m and m*n, respectively. Assign to b the transpose of a (i.e. the value with index interchange).
|
||
198 |
Abort program execution with error condition x (where x is an integer value)
|
||
200 |
Compute the hypotenuse h of the triangle where the sides adjacent to the square angle have lengths x and y.
|
||
204 |
Given a real number a, print the fractional part and the exponent of the internal representation of that number. For 3.14, this should print (approximately)
0.785 2 |
|
|
205 |
Read an environment variable with the name "FOO" and assign it to the string variable foo. If it does not exist or if the system does not support environment variables, assign a value of "none".
|
|
|
206 |
Execute different procedures foo, bar, baz and barfl if the string str contains the name of the respective procedure. Do it in a way natural to the language.
|
||
210 |
Assign, at runtime, the compiler version and the options the program was compiled with to variables version and options, respectively, and print them. For interpreted languages, substitute the version of the interpreter.
Example output: GCC version 10.0.0 20190914 (experimental) -mtune=generic -march=x86-64 |
|
|
219 |
Create the string t from the value of string s with each sequence of spaces replaced by a single space.
Explain if only the space characters will be replaced, or the other whitespaces as well: tabs, newlines. |
||
223 |
Loop through list items checking a condition. Do something else if no matches are found.
A typical use case is looping through a series of containers looking for one that matches a condition. If found, an item is inserted; otherwise, a new container is created. These are mostly used as an inner nested loop, and in a location where refactoring inner logic into a separate function reduces clarity. |
||
224 |
Insert the element x at the beginning of the list items.
|
||
225 |
Declare an optional integer argument x to procedure f, printing out "Present" and its value if it is present, "Not present" otherwise
|
||
227 |
Create the new list y containing the same elements as the list x.
Subsequent modifications of y must not affect x (except for the contents referenced by the elements themselves if they contain pointers). |
||
238 |
Write in a new byte array c the xor result of byte arrays a and b.
a and b have the same size. |
||
243 |
Print the contents of the list or array a on the standard output.
|
|
|
246 |
Set c to the number of distinct elements in the list items.
|
||
256 |
Print the numbers 5, 4, ..., 0 (included), one line per number.
|
|
|
266 |
Assign to the string s the value of the string v repeated n times, and write it out.
E.g. v="abc", n=5 ⇒ s="abcabcabcabcabc" |
|
|
268 |
Define a type vector containing three floating point numbers x, y, and z. Write a user-defined operator x that calculates the cross product of two vectors a and b.
|
||
272 |
Fizz buzz is a children's counting game, and a trivial programming task used to affirm that a programmer knows the basics of a language: loops, conditions and I/O.
The typical fizz buzz game is to count from 1 to 100, saying each number in turn. When the number is divisible by 3, instead say "Fizz". When the number is divisible by 5, instead say "Buzz". When the number is divisible by both 3 and 5, say "FizzBuzz" |
|
|
276 |
Insert an element e into the set x.
|
||
282 |
Declare a type Foo, and create a new map with Foo as key type.
Mention the conditions on Foo required to make it a possible map key type. |
||
283 |
Build the list parts consisting of substrings of input string s, separated by the string sep.
|
||
284 |
Create a new list a (or array, or slice) of size n, where all elements are integers initialized with the value 0.
|
||
285 |
Given two floating point variables a and b, set a to a to a quiet NaN and b to a signalling NaN. Use standard features of the language only, without invoking undefined behavior.
|
||
289 |
Create the string s by concatenating the strings a and b.
|
||
291 |
Delete all the elements from index i (included) to index j (excluded) from the list items.
|
||
299 |
Write a line of comments.
This line will not be compiled or executed. |
|
|
302 |
Given the integer x = 8, assign to the string s the value "Our sun has 8 planets", where the number 8 was evaluated from x.
|
||
327 |
Assign to t the value of the string s, with all letters mapped to their lower case.
|
||
328 |
Assign to t the value of the string s, with all letters mapped to their upper case.
|
||
329 |
Assign to v the value stored in the map m for the key k.
Explain what happens if there is no entry for k in m. |
||
335 |
Create the map m containing all the elements e of the list a, using as key the field e.id.
|