task_url
stringlengths
30
116
task_name
stringlengths
2
86
task_description
stringlengths
0
14.4k
language_url
stringlengths
2
53
language_name
stringlengths
1
52
code
stringlengths
0
61.9k
http://rosettacode.org/wiki/Shell_one-liner
Shell one-liner
Task Show how to specify and execute a short program in the language from a command shell, where the input to the command shell is only one line in length. Avoid depending on the particular shell or operating system used as much as is reasonable; if the language has notable implementations which have different comman...
#Vedit_macro_language
Vedit macro language
vpw -c'Get_Key("Hello!") exit'
http://rosettacode.org/wiki/Shell_one-liner
Shell one-liner
Task Show how to specify and execute a short program in the language from a command shell, where the input to the command shell is only one line in length. Avoid depending on the particular shell or operating system used as much as is reasonable; if the language has notable implementations which have different comman...
#Wart
Wart
echo "prn 34" |wart
http://rosettacode.org/wiki/Shell_one-liner
Shell one-liner
Task Show how to specify and execute a short program in the language from a command shell, where the input to the command shell is only one line in length. Avoid depending on the particular shell or operating system used as much as is reasonable; if the language has notable implementations which have different comman...
#Wren
Wren
echo 'System.print("Hello from Wren!")' > tmp.wren; wren tmp.wren
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#Haskell
Haskell
module ShortCircuit where   import Prelude hiding ((&&), (||)) import Debug.Trace   False && _ = False True && False = False _ && _ = True   True || _ = True False || True = True _ || _ = False   a p = trace ("<a " ++ show p ++ ">") p b p = trace ("<b " ++ show p ++ ">") p   main = mapM_ prin...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#F.23
F#
open System   type Number = One | Two | Three type Color = Red | Green | Purple type Fill = Solid | Open | Striped type Symbol = Oval | Squiggle | Diamond   type Card = { Number: Number; Color: Color; Fill: Fill; Symbol: Symbol }   // A 'Set' is 3 cards in which each individual feature is either all the SAME on each ca...
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#Emacs_Lisp
Emacs Lisp
(secure-hash 'sha256 "Rosetta code") ;; as string of hex digits
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#Erlang
Erlang
10> Binary = crypto:hash( sha256, "Rosetta code" ). 11> lists:append( [erlang:integer_to_list(X, 16) || <<X:8/integer>> <= Binary] ). "764FAF5C61AC315F1497F9DFA542713965B785E5CC2F707D6468D7D1124CDFCF"
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#F.23
F#
  let n = System.Security.Cryptography.SHA1.Create() Array.iter (printf "%x ") (n.ComputeHash "Rosetta Code"B)  
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#Factor
Factor
IN: scratchpad USING: checksums checksums.sha ; IN: scratchpad "Rosetta Code" sha1 checksum-bytes hex-string . "48c98f7e5a6e736d790ab740dfc3f51a61abe2b5"
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#Forth
Forth
require random.fs   : d5 5 random 1+ ; : discard? 5 = swap 1 > and ; : d7 begin d5 d5 2dup discard? while 2drop repeat 1- 5 * + 1- 7 mod 1+ ;
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#Fortran
Fortran
module rand_mod implicit none   contains   function rand5() integer :: rand5 real :: r   call random_number(r) rand5 = 5*r + 1 end function   function rand7() integer :: rand7   do rand7 = 5*rand5() + rand5() - 6 if (rand7 < 21) then rand7 = rand7 / 3 + 1 return end if end do end...
http://rosettacode.org/wiki/Sexy_primes
Sexy primes
This page uses content from Wikipedia. The original article was at Sexy_prime. The list of authors can be seen in the page history. As with Rosetta Code, the text of Wikipedia is available under the GNU FDL. (See links for details on variance) In mathematics, sexy primes are prime numbers that differ from each ot...
#Pascal
Pascal
program SexyPrimes;   uses SysUtils {$IFNDEF FPC} ,windows // GettickCount64 {$ENDIF}   const ctext: array[0..5] of string = ('Primes', 'sexy prime pairs', 'sexy prime triplets', 'sexy prime quadruplets', 'sexy prime quintuplet', 'sexy prime sextuplet');   primeLmt = 1000 * 1000 + 35; type ...
http://rosettacode.org/wiki/Show_ASCII_table
Show ASCII table
Task Show  the ASCII character set  from values   32   to   127   (decimal)   in a table format. Other tasks related to string operations: Metrics Array length String length Copy a string Empty string  (assignment) Counting Word frequency Letter frequency Jewels and stones I before E except after C Bioin...
#Dc
Dc
[ [1q]S.[>.0]xs.L. ] sl ## l: islt   ## for initcode condcode incrcode body ## [1] [2] [3] [4] [ [q]S. 4:. 3:. 2:. 1:. 1;.x [2;.x 0=. 4;.x 3;.x 0;.x]d0:.x Os.L.o ] sf ## f: for   ## for( i=0 ; i<16 ; ++i ) { ## for( j=32+i ; j<128 ; j+=16 ) { ## pr "%3d", j, " :...
http://rosettacode.org/wiki/Sierpinski_triangle
Sierpinski triangle
Task Produce an ASCII representation of a Sierpinski triangle of order   N. Example The Sierpinski triangle of order   4   should look like this: * * * * * * * * * * * * * * * ...
#Mathematica.2FWolfram_Language
Mathematica/Wolfram Language
n=4;Grid[CellularAutomaton[90,{{1},0},2^n-1]/.{0->" ",1->"*"},ItemSize->All]
http://rosettacode.org/wiki/Sierpinski_carpet
Sierpinski carpet
Task Produce a graphical or ASCII-art representation of a Sierpinski carpet of order   N. For example, the Sierpinski carpet of order   3   should look like this: ########################### # ## ## ## ## ## ## ## ## # ########################### ### ###### ###### ### # # # ## # # ## # # # ### ###### ...
#FreeBASIC
FreeBASIC
  Function in_carpet(x As Uinteger, y As Uinteger) As Boolean While x <> 0 And y <> 0 If(x Mod 3) = 1 And (y Mod 3) = 1 Then Return False y = y \ 3: x = x \ 3 Wend Return True End Function   Sub carpet(n As Uinteger) Dim As Uinteger i, j, k = (3^n)-1   For i = 0 To k For j =...
http://rosettacode.org/wiki/Shell_one-liner
Shell one-liner
Task Show how to specify and execute a short program in the language from a command shell, where the input to the command shell is only one line in length. Avoid depending on the particular shell or operating system used as much as is reasonable; if the language has notable implementations which have different comman...
#zkl
zkl
echo 'println("Hello World ",5+6)' | zkl
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#Icon_and_Unicon
Icon and Unicon
procedure main() &trace := -1 # ensures functions print their names   every (i := false | true ) & ( j := false | true) do { write("i,j := ",image(i),", ",image(j)) write("i & j:") x := i() & j() # invoke true/false write("i | j:") y := i() | j() # invoke true/false } end   procedure true() #: succeed...
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#Io
Io
a := method(bool, writeln("a(#{bool}) called." interpolate) bool ) b := method(bool, writeln("b(#{bool}) called." interpolate) bool )   list(true,false) foreach(avalue, list(true,false) foreach(bvalue, x := a(avalue) and b(bvalue) writeln("x = a(#{avalue}) and b(#{bvalue}) is #{x}" i...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#Factor
Factor
USING: arrays backtrack combinators.short-circuit formatting fry grouping io kernel literals math.combinatorics math.matrices prettyprint qw random sequences sets ; IN: rosetta-code.set-puzzle   CONSTANT: deck $[ [ qw{ red green purple } amb-lazy qw{ one two three } amb-lazy qw{ oval squiggl...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#Go
Go
package main   import ( "fmt" "math/rand" "time" )   const ( number = [3]string{"1", "2", "3"} color = [3]string{"red", "green", "purple"} shade = [3]string{"solid", "open", "striped"} shape = [3]string{"oval", "squiggle", "diamond"} )   type card int   func (c card) String() string { ...
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#F.23
F#
open System.Security.Cryptography open System.Text   "Rosetta code" |> Encoding.ASCII.GetBytes |> (new SHA256Managed()).ComputeHash |> System.BitConverter.ToString |> printfn "%s"  
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#Factor
Factor
USING: checksums checksums.sha io math.parser ;   "Rosetta code" sha-256 checksum-bytes bytes>hex-string print
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#Fortran
Fortran
module sha1_mod use kernel32 use advapi32 implicit none integer, parameter :: SHA1LEN = 20 contains subroutine sha1hash(name, hash, dwStatus, filesize) implicit none character(*) :: name integer, parameter :: BUFLEN = 32768 integer(HANDLE) :: hFile, hProv, hHash ...
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#FreeBASIC
FreeBASIC
  Function dice5() As Integer Return Int(Rnd * 5) + 1 End Function   Function dice7() As Integer Dim As Integer temp Do temp = dice5() * 5 + dice5() -6 Loop Until temp < 21 Return (temp Mod 7) +1 End Function   Dim Shared As Ulongint n = 1000000 Print "Testing "; n; " times" If Not(distCheck...
http://rosettacode.org/wiki/Sexy_primes
Sexy primes
This page uses content from Wikipedia. The original article was at Sexy_prime. The list of authors can be seen in the page history. As with Rosetta Code, the text of Wikipedia is available under the GNU FDL. (See links for details on variance) In mathematics, sexy primes are prime numbers that differ from each ot...
#Perl
Perl
use ntheory qw/prime_iterator is_prime/;   sub tuple_tail { my($n,$cnt,@array) = @_; $n = @array if $n > @array; my @tail; for (1..$n) { my $p = $array[-$n+$_-1]; push @tail, "(" . join(" ", map { $p+6*$_ } 0..$cnt-1) . ")"; } return @tail; }   sub comma { (my $s = reverse sh...
http://rosettacode.org/wiki/Show_ASCII_table
Show ASCII table
Task Show  the ASCII character set  from values   32   to   127   (decimal)   in a table format. Other tasks related to string operations: Metrics Array length String length Copy a string Empty string  (assignment) Counting Word frequency Letter frequency Jewels and stones I before E except after C Bioin...
#Delphi
Delphi
  program Show_Ascii_table;   {$APPTYPE CONSOLE}   var i, j: Integer; k: string;   begin for i := 0 to 15 do begin j := 32 + i; while j < 128 do begin case j of 32: k := 'Spc'; 127: k := 'Del'; else k := chr(j); end; Write(j: 3, ' :...
http://rosettacode.org/wiki/Sierpinski_triangle
Sierpinski triangle
Task Produce an ASCII representation of a Sierpinski triangle of order   N. Example The Sierpinski triangle of order   4   should look like this: * * * * * * * * * * * * * * * ...
#MATLAB
MATLAB
n = 4; d = string('*'); for k = 0 : n - 1 sp = repelem(' ', 2 ^ k); d = [sp + d + sp, d + ' ' + d]; end disp(d.join(char(10)))  
http://rosettacode.org/wiki/Sierpinski_carpet
Sierpinski carpet
Task Produce a graphical or ASCII-art representation of a Sierpinski carpet of order   N. For example, the Sierpinski carpet of order   3   should look like this: ########################### # ## ## ## ## ## ## ## ## # ########################### ### ###### ###### ### # # # ## # # ## # # # ### ###### ...
#Gnuplot
Gnuplot
  ## SCff.gp 1/14/17 aev ## Plotting Sierpinski carpet fractal. ## dat-files are PARI/GP generated output files: ## http://rosettacode.org/wiki/Sierpinski_carpet#PARI.2FGP #cd 'C:\gnupData'   ##SC5 clr = '"green"' filename = "SC5gp1" ttl = "Sierpinski carpet fractal, v.#1" load "plotff.gp"  
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#J
J
labeled=:1 :'[ smoutput@,&":~&m' A=: 'A ' labeled B=: 'B ' labeled and=: ^: or=: 2 :'u^:(-.@v)'
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#Java
Java
public class ShortCirc { public static void main(String[] args){ System.out.println("F and F = " + (a(false) && b(false)) + "\n"); System.out.println("F or F = " + (a(false) || b(false)) + "\n");   System.out.println("F and T = " + (a(false) && b(true)) + "\n"); System.out.println("F...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#Haskell
Haskell
import Control.Monad.State (State, evalState, replicateM, runState, state) import System.Random (StdGen, newStdGen, randomR) import Data.List (find, nub, sort)   combinations :: Int -> [a] -> [[a]] combinations 0 _ = [[]] combinations _ [] = [] combinations k (y:ys) = map (y :) (combinations (k - 1) ys) ++ combi...
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#Forth
Forth
  c-library crypto   s" ssl" add-lib s" crypto" add-lib   \c #include <openssl/sha.h> c-function sha256 SHA256 a n a -- a   end-c-library   : 2h. ( n1 -- ) base @ swap hex s>d <# # # #> type base ! ;   : .digest ( a -- ) 32 bounds do i c@ 2h. loop space ;   s" Rosetta code" 0 sha256 .digest cr bye  
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#Fortran
Fortran
sha256 rc.txt 764FAF5C61AC315F1497F9DFA542713965B785E5CC2F707D6468D7D1124CDFCF rc.txt (12 bytes)
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#FreeBASIC
FreeBASIC
' version 18-10-2016 ' started with SHA-1/FIPS-180-1 ' but used the BBC BASIC native version to finish. ' compile with: fbc -s console   Function SHA_1(test_str As String) As String   Dim As String message = test_str ' strings are passed as ByRef's   Dim As Long i, j Dim As UByte Ptr ww1 Dim As UInteger<32>...
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#Go
Go
package main   import ( "fmt" "math" "math/rand" "time" )   // "given" func dice5() int { return rand.Intn(5) + 1 }   // function specified by task "Seven-sided dice from five-sided dice" func dice7() (i int) { for { i = 5*dice5() + dice5() if i < 27 { break }...
http://rosettacode.org/wiki/Sexy_primes
Sexy primes
This page uses content from Wikipedia. The original article was at Sexy_prime. The list of authors can be seen in the page history. As with Rosetta Code, the text of Wikipedia is available under the GNU FDL. (See links for details on variance) In mathematics, sexy primes are prime numbers that differ from each ot...
#Phix
Phix
function create_sieve(integer limit) sequence sieve = repeat(true,limit) sieve[1] = false for i=4 to limit by 2 do sieve[i] = false end for for p=3 to floor(sqrt(limit)) by 2 do integer p2 = p*p if sieve[p2] then for k=p2 to limit by p*2 do sieve[k...
http://rosettacode.org/wiki/Show_ASCII_table
Show ASCII table
Task Show  the ASCII character set  from values   32   to   127   (decimal)   in a table format. Other tasks related to string operations: Metrics Array length String length Copy a string Empty string  (assignment) Counting Word frequency Letter frequency Jewels and stones I before E except after C Bioin...
#Excel
Excel
asciiTable =LAMBDA(i, justifyRight(3)(" ")(i) & ": " & ( justifyRight( 3 )(" ")( IF(32 = i, "Spc", IF(127 = i, "Del", CHAR(i) ) ) ) ) )( SEQUENCE(16, 6, 32, 1) )
http://rosettacode.org/wiki/Sierpinski_triangle
Sierpinski triangle
Task Produce an ASCII representation of a Sierpinski triangle of order   N. Example The Sierpinski triangle of order   4   should look like this: * * * * * * * * * * * * * * * ...
#NetRexx
NetRexx
/* NetRexx */ options replace format comments java crossref symbols nobinary   numeric digits 1000 runSample(arg) return   -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ method runSample(arg) public static BLACK_UPPOINTING_TRIANGLE = '\u25b2' parse arg ordr filr . if ordr = '' | ...
http://rosettacode.org/wiki/Sierpinski_carpet
Sierpinski carpet
Task Produce a graphical or ASCII-art representation of a Sierpinski carpet of order   N. For example, the Sierpinski carpet of order   3   should look like this: ########################### # ## ## ## ## ## ## ## ## # ########################### ### ###### ###### ### # # # ## # # ## # # # ### ###### ...
#Go
Go
package main   import ( "fmt" "strings" "unicode/utf8" )   var order = 3 var grain = "#"   func main() { carpet := []string{grain} for ; order > 0; order-- { // repeat expression allows for multiple character // grain and for multi-byte UTF-8 characters. hole := strings.Repea...
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#JavaScript
JavaScript
(function () { 'use strict';   function a(bool) { console.log('a -->', bool);   return bool; }   function b(bool) { console.log('b -->', bool);   return bool; }     var x = a(false) && b(true), y = a(true) || b(false), z = true ? a(true) : b(false)...
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#jq
jq
def a(x): " a(\(x))" | stderr | x;   def b(y): " b(\(y))" | stderr | y;   "and:", (a(true) and b(true)), "or:", (a(true) or b(true)), "and:", (a(false) and b(true)), "or:", (a(false) or b(true))
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#J
J
require 'stats/base'   Number=: ;:'one two three' Colour=: ;:'red green purple' Fill=: ;:'solid open striped' Symbol=: ;:'oval squiggle diamond' Features=: Number ; Colour ; Fill ;< Symbol Deck=: > ; <"1 { i.@#&.> Features sayCards=: (', ' joinstring Features {&>~ ])"1 drawRandom=: ] {~ (? #) isSet=: *./@:(1 3 e.~ [: #...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#Java
Java
import java.util.*;   public class SetPuzzle {   enum Color {   GREEN(0), PURPLE(1), RED(2);   private Color(int v) { val = v; } public final int val; }   enum Number {   ONE(0), TWO(1), THREE(2);   private Number(int v) { val = v; ...
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#Free_Pascal
Free Pascal
program rosettaCodeSHA256;   uses SysUtils, DCPsha256;   var ros: String; sha256 : TDCP_sha256; digest : array[0..63] of byte; i: Integer; output: String; begin ros := 'Rosetta code';   sha256 := TDCP_sha256.Create(nil); sha256.init; sha256.UpdateStr(ros); sha256.Final(digest);   output := '';  ...
http://rosettacode.org/wiki/Sequence:_smallest_number_greater_than_previous_term_with_exactly_n_divisors
Sequence: smallest number greater than previous term with exactly n divisors
Calculate the sequence where each term an is the smallest natural number greater than the previous term, that has exactly n divisors. Task Show here, on this page, at least the first 15 terms of the sequence. See also OEIS:A069654 Related tasks Sequence: smallest number with exactly n divisors Sequence: nth ...
#11l
11l
F divisors(n) V divs = [1] L(ii) 2 .< Int(n ^ 0.5) + 3 I n % ii == 0 divs.append(ii) divs.append(Int(n / ii)) divs.append(n) R Array(Set(divs))   F sequence(max_n) V previous = 0 V n = 0 [Int] r L n++ V ii = previous I n > max_n L.break L ...
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#Frink
Frink
println[messageDigest["Rosetta Code", "SHA-1"]]
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#Genie
Genie
print Checksum.compute_for_string(ChecksumType.SHA1, "Rosetta code", -1)
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#Groovy
Groovy
random = new Random()   int rand5() { random.nextInt(5) + 1 }   int rand7From5() { def raw = 25 while (raw > 21) { raw = 5*(rand5() - 1) + rand5() } (raw % 7) + 1 }
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#Haskell
Haskell
import System.Random import Data.List   sevenFrom5Dice = do d51 <- randomRIO(1,5) :: IO Int d52 <- randomRIO(1,5) :: IO Int let d7 = 5*d51+d52-6 if d7 > 20 then sevenFrom5Dice else return $ 1 + d7 `mod` 7
http://rosettacode.org/wiki/Sexy_primes
Sexy primes
This page uses content from Wikipedia. The original article was at Sexy_prime. The list of authors can be seen in the page history. As with Rosetta Code, the text of Wikipedia is available under the GNU FDL. (See links for details on variance) In mathematics, sexy primes are prime numbers that differ from each ot...
#Prolog
Prolog
sexy_prime_group(1, N, _, [N]):- is_prime(N), !. sexy_prime_group(Size, N, Limit, [N|Group]):- is_prime(N), N1 is N + 6, N1 =< Limit, S1 is Size - 1, sexy_prime_group(S1, N1, Limit, Group).   print_sexy_prime_groups(Size, Limit):- findall(G, (is_prime(P), P =< Limit, sexy_prime_group(Siz...
http://rosettacode.org/wiki/Show_ASCII_table
Show ASCII table
Task Show  the ASCII character set  from values   32   to   127   (decimal)   in a table format. Other tasks related to string operations: Metrics Array length String length Copy a string Empty string  (assignment) Counting Word frequency Letter frequency Jewels and stones I before E except after C Bioin...
#Factor
Factor
USING: combinators formatting io kernel math math.ranges pair-rocket sequences ; IN: rosetta-code.ascii-table   : row-values ( n -- seq ) [ 32 + ] [ 112 + ] bi 16 <range> ;   : ascii>output ( n -- str ) { 32 => [ "Spc" ] 127 => [ "Del" ] [ "" 1sequence ] } case ;   : print-row ( n -- ) row-values [ dup ascii>ou...
http://rosettacode.org/wiki/Sierpinski_triangle
Sierpinski triangle
Task Produce an ASCII representation of a Sierpinski triangle of order   N. Example The Sierpinski triangle of order   4   should look like this: * * * * * * * * * * * * * * * ...
#Nim
Nim
const size = 1 shl 4 - 1   for y in countdown(size, 0): for i in 0 .. <y: stdout.write " " for x in 0 .. size-y: if (x and y) != 0: stdout.write " " else: stdout.write "* " stdout.write "\n"
http://rosettacode.org/wiki/Sierpinski_carpet
Sierpinski carpet
Task Produce a graphical or ASCII-art representation of a Sierpinski carpet of order   N. For example, the Sierpinski carpet of order   3   should look like this: ########################### # ## ## ## ## ## ## ## ## # ########################### ### ###### ###### ### # # # ## # # ## # # # ### ###### ...
#Groovy
Groovy
def base3 = { BigInteger i -> i.toString(3) }   def sierpinskiCarpet = { int order -> StringBuffer sb = new StringBuffer() def positions = 0..<(3**order) def digits = 0..<([order,1].max())   positions.each { i -> String i3 = base3(i).padLeft(order, '0')   positions.each { j -> ...
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#Julia
Julia
a(x) = (println("\t# Called a($x)"); return x) b(x) = (println("\t# Called b($x)"); return x)   for i in [true,false], j in [true, false] println("\nCalculating: x = a($i) && b($j)"); x = a(i) && b(j) println("\tResult: x = $x") println("\nCalculating: y = a($i) || b($j)"); y = a(i) || b(j) println("\tR...
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#Kotlin
Kotlin
// version 1.1.2   fun a(v: Boolean): Boolean { println("'a' called") return v }   fun b(v: Boolean): Boolean { println("'b' called") return v }   fun main(args: Array<String>){ val pairs = arrayOf(Pair(true, true), Pair(true, false), Pair(false, true), Pair(false, false)) for (pair in pairs) { ...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#Julia
Julia
using Random, IterTools, Combinatorics   function SetGameTM(basic = true) drawsize = basic ? 9 : 12 setsneeded = div(drawsize, 2) setsof3 = Vector{Vector{NTuple{4, String}}}() draw = Vector{NTuple{4, String}}() deck = collect(Iterators.product(["red", "green", "purple"], ["one", "two", "three"], ...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#Kotlin
Kotlin
// version 1.1.3   import java.util.Collections.shuffle   enum class Color { RED, GREEN, PURPLE } enum class Symbol { OVAL, SQUIGGLE, DIAMOND } enum class Number { ONE, TWO, THREE } enum class Shading { SOLID, OPEN, STRIPED } enum class Degree { BASIC, ADVANCED }   class Card( val color: Color, val symbo...
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#FreeBASIC
FreeBASIC
' version 20-10-2016 ' FIPS PUB 180-4 ' compile with: fbc -s console   Function SHA_256(test_str As String) As String   #Macro Ch (x, y, z) (((x) And (y)) Xor ((Not (x)) And z)) #EndMacro   #Macro Maj (x, y, z) (((x) And (y)) Xor ((x) And (z)) Xor ((y) And (z))) #EndMacro   #Macro sigma0 (x) (((x)...
http://rosettacode.org/wiki/Sequence:_smallest_number_greater_than_previous_term_with_exactly_n_divisors
Sequence: smallest number greater than previous term with exactly n divisors
Calculate the sequence where each term an is the smallest natural number greater than the previous term, that has exactly n divisors. Task Show here, on this page, at least the first 15 terms of the sequence. See also OEIS:A069654 Related tasks Sequence: smallest number with exactly n divisors Sequence: nth ...
#Action.21
Action!
CARD FUNC CountDivisors(CARD a) CARD i,count   i=1 count=0 WHILE i*i<=a DO IF a MOD i=0 THEN IF i=a/i THEN count==+1 ELSE count==+2 FI FI i==+1 OD RETURN (count)   PROC Main() CARD a BYTE i   a=1 FOR i=1 TO 15 DO WHILE CountDivisors(a)#i DO ...
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#Go
Go
package main   import ( "crypto/sha1" "fmt" )   func main() { h := sha1.New() h.Write([]byte("Rosetta Code")) fmt.Printf("%x\n", h.Sum(nil)) }
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#Icon_and_Unicon
Icon and Unicon
  $include "distribution-checker.icn"   # return a uniformly distributed number from 1 to 7, # but only using a random number in range 1 to 5. procedure die_7 () while rnd := 5*?5 + ?5 - 6 do { if rnd < 21 then suspend rnd % 7 + 1 } end   procedure main () if verify_uniform (create (|die_7()), 1000000, 0.01) ...
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#J
J
rollD5=: [: >: ] ?@$ 5: NB. makes a y shape array of 5s, "rolls" the array and increments. roll2xD5=: [: rollD5 2 ,~ */ NB. rolls D5 twice for each desired D7 roll (y rows, 2 cols) toBase10=: 5 #. <: NB. decrements and converts rows from base 5 to 10 keepGood=: #~ 21&> NB. compress out values n...
http://rosettacode.org/wiki/Sexy_primes
Sexy primes
This page uses content from Wikipedia. The original article was at Sexy_prime. The list of authors can be seen in the page history. As with Rosetta Code, the text of Wikipedia is available under the GNU FDL. (See links for details on variance) In mathematics, sexy primes are prime numbers that differ from each ot...
#PureBasic
PureBasic
DisableDebugger EnableExplicit   #LIM=1000035   Macro six(mul) 6*mul EndMacro   Macro form(n) RSet(Str(n),8) EndMacro   Macro put(m,g,n) PrintN(Str(m)+" "+g) PrintN(n) EndMacro   Define c1.i=2,c2.i,c3.i,c4.i,c5.i,t1$,t2$,t3$,t4$,t5$,i.i,j.i   Global Dim soe.b(#LIM) FillMemory(@soe(0),#LIM,#True,#PB_Byte) If N...
http://rosettacode.org/wiki/Show_ASCII_table
Show ASCII table
Task Show  the ASCII character set  from values   32   to   127   (decimal)   in a table format. Other tasks related to string operations: Metrics Array length String length Copy a string Empty string  (assignment) Counting Word frequency Letter frequency Jewels and stones I before E except after C Bioin...
#Forth
Forth
DECIMAL : ###: ( c -- ) 3 .R ." : " ;   : .CHAR ( c -- ) DUP CASE BL OF ###: ." spc" ENDOF 127 OF ###: ." del" ENDOF DUP ###: EMIT 2 SPACES ENDCASE 3 SPACES ;   : .ROW ( n2 n1 -- ) CR DO I .CHAR 16 +LOOP ;   : ASCII.TABLE ( -- ) 16 0...
http://rosettacode.org/wiki/Sierpinski_triangle
Sierpinski triangle
Task Produce an ASCII representation of a Sierpinski triangle of order   N. Example The Sierpinski triangle of order   4   should look like this: * * * * * * * * * * * * * * * ...
#OCaml
OCaml
let sierpinski n = let rec loop down space n = if n = 0 then down else loop (List.map (fun x -> space ^ x ^ space) down @ List.map (fun x -> x ^ " " ^ x) down) (space ^ space) (n - 1) in loop ["*"] " " n   let () = List.iter print_endline (sierpinski 4)
http://rosettacode.org/wiki/Sierpinski_carpet
Sierpinski carpet
Task Produce a graphical or ASCII-art representation of a Sierpinski carpet of order   N. For example, the Sierpinski carpet of order   3   should look like this: ########################### # ## ## ## ## ## ## ## ## # ########################### ### ###### ###### ### # # # ## # # ## # # # ### ###### ...
#Haskell
Haskell
inCarpet :: Int -> Int -> Bool inCarpet 0 _ = True inCarpet _ 0 = True inCarpet x y = not ((xr == 1) && (yr == 1)) && inCarpet xq yq where ((xq, xr), (yq, yr)) = (x `divMod` 3, y `divMod` 3)   carpet :: Int -> [String] carpet n = map (zipWith (\x y -> if inCarpet x y then '#' else ' ') ...
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#Lambdatalk
Lambdatalk
  {def A {lambda {:bool} :bool}} -> A {def B {lambda {:bool} :bool}} -> B   {and {A true} {B true}} -> true {and {A true} {B false}} -> false {and {A false} {B true}} -> false {and {A false} {B false}} -> false   {or {A true} {B true}} -> true {or {A true} {B false}} -> true {or {A false} {B true}} -> true...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#Mathematica.2FWolfram_Language
Mathematica/Wolfram Language
colors = {Red, Green, Purple}; symbols = {"0", "\[TildeTilde]", "\[Diamond]"}; numbers = {1, 2, 3}; shadings = {"\[FilledSquare]", "\[Square]", "\[DoublePrime]"};   validTripleQ[l_List] := Entropy[l] != Entropy[{1, 1, 2}]; validSetQ[cards_List] := And @@ (validTripleQ /@ Transpose[cards]);   allCards = Tuples[{colors, ...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#Nim
Nim
import algorithm, math, random, sequtils, strformat, strutils   type   # Card features. Number {.pure.} = enum One, Two, Three Color {.pure.} = enum Red, Green, Purple Symbol {.pure.} = enum Oval, Squiggle, Diamond Shading {.pure.} = enum Solid, Open, Striped   # Cards and list of cards. Card = tuple[numb...
http://rosettacode.org/wiki/Sequence:_smallest_number_with_exactly_n_divisors
Sequence: smallest number with exactly n divisors
Calculate the sequence where each term   an   is the smallest natural number that has exactly   n   divisors. Task Show here, on this page, at least the first  15  terms of the sequence. Related tasks Sequence: smallest number greater than previous term with exactly n divisors Sequence: nth number with exactly...
#11l
11l
F divisors(n) V divs = [1] L(ii) 2 .< Int(n ^ 0.5) + 3 I n % ii == 0 divs.append(ii) divs.append(Int(n / ii)) divs.append(n) R Array(Set(divs))   F sequence(max_n) V n = 0 [Int] r L n++ V ii = 0 I n > max_n L.break L ii++ I ...
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#Frink
Frink
println[messageDigest["Rosetta code", "SHA-256"]]
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#FunL
FunL
native java.security.MessageDigest   def sha256Java( message ) = map( a -> format('%02x', a), list(MessageDigest.getInstance('SHA-256').digest(message.getBytes('UTF-8'))) ).mkString()
http://rosettacode.org/wiki/Sequence:_smallest_number_greater_than_previous_term_with_exactly_n_divisors
Sequence: smallest number greater than previous term with exactly n divisors
Calculate the sequence where each term an is the smallest natural number greater than the previous term, that has exactly n divisors. Task Show here, on this page, at least the first 15 terms of the sequence. See also OEIS:A069654 Related tasks Sequence: smallest number with exactly n divisors Sequence: nth ...
#Ada
Ada
with Ada.Text_IO;   procedure Show_Sequence is   function Count_Divisors (N : in Natural) return Natural is Count : Natural := 0; I  : Natural; begin I := 1; while I**2 <= N loop if N mod I = 0 then if I = N / I then Count := Count + 1; el...
http://rosettacode.org/wiki/Sequence:_smallest_number_greater_than_previous_term_with_exactly_n_divisors
Sequence: smallest number greater than previous term with exactly n divisors
Calculate the sequence where each term an is the smallest natural number greater than the previous term, that has exactly n divisors. Task Show here, on this page, at least the first 15 terms of the sequence. See also OEIS:A069654 Related tasks Sequence: smallest number with exactly n divisors Sequence: nth ...
#ALGOL_68
ALGOL 68
BEGIN   PROC count divisors = ( INT n )INT: BEGIN INT i2, count := 0; FOR i WHILE ( i2 := i * i ) < n DO IF n MOD i = 0 THEN count +:= 2 FI OD; IF i2 = n THEN count + 1 ELSE count FI END # count divisors # ;   INT max = 15;   ...
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#Halon
Halon
$var = "Rosetta Code"; echo sha1($var);
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#Hare
Hare
use crypto::sha1; use encoding::hex; use fmt; use hash; use os; use strings;   export fn main() void = { const sha = sha1::sha1(); hash::write(&sha, strings::toutf8("Rosetta Code"));   let sum: [sha1::SIZE]u8 = [0...]; hash::sum(&sha, sum); hex::encode(os::stdout, sum)!; fmt::println()!; };
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#Java
Java
import java.util.Random; public class SevenSidedDice { private static final Random rnd = new Random(); public static void main(String[] args) { SevenSidedDice now=new SevenSidedDice(); System.out.println("Random number from 1 to 7: "+now.seven()); } int seven() { int v=21; while(v>20) v=five()+five()*...
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#JavaScript
JavaScript
function dice5() { return 1 + Math.floor(5 * Math.random()); }   function dice7() { while (true) { var dice55 = 5 * dice5() + dice5() - 6; if (dice55 < 21) return dice55 % 7 + 1; } }   distcheck(dice5, 1000000); print(); distcheck(dice7, 1000000);
http://rosettacode.org/wiki/Sexy_primes
Sexy primes
This page uses content from Wikipedia. The original article was at Sexy_prime. The list of authors can be seen in the page history. As with Rosetta Code, the text of Wikipedia is available under the GNU FDL. (See links for details on variance) In mathematics, sexy primes are prime numbers that differ from each ot...
#Python
Python
LIMIT = 1_000_035 def primes2(limit=LIMIT): if limit < 2: return [] if limit < 3: return [2] lmtbf = (limit - 3) // 2 buf = [True] * (lmtbf + 1) for i in range((int(limit ** 0.5) - 3) // 2 + 1): if buf[i]: p = i + i + 3 s = p * (i + 1) + i buf[s::p] = [Fal...
http://rosettacode.org/wiki/Show_ASCII_table
Show ASCII table
Task Show  the ASCII character set  from values   32   to   127   (decimal)   in a table format. Other tasks related to string operations: Metrics Array length String length Copy a string Empty string  (assignment) Counting Word frequency Letter frequency Jewels and stones I before E except after C Bioin...
#Fortran
Fortran
PROGRAM ASCTBL ! show the ASCII characters from 32-127 IMPLICIT NONE INTEGER I, J CHARACTER*3 H   10 FORMAT (I3, ':', A3, ' ', $) 20 FORMAT () DO J = 0, 15, +1 DO I = 32+J, 127, +16 IF (I > 32 .AND. I < 127) THEN H = ' ' // ACHAR(I) // ' ' ...
http://rosettacode.org/wiki/Sierpinski_triangle
Sierpinski triangle
Task Produce an ASCII representation of a Sierpinski triangle of order   N. Example The Sierpinski triangle of order   4   should look like this: * * * * * * * * * * * * * * * ...
#Oforth
Oforth
: nextGen(l, r) | i | StringBuffer new l size loop: i [ l at(i 1 -) '*' == 4 * l at(i) '*' == 2 * + l at(i 1 +) '*' == + 2 swap pow r bitAnd ifTrue: [ '*' ] else: [ ' ' ] over addChar ] ;   : automat(rule, n) StringBuffer new " " <<n(n) "*" over + + #[ dup println rule next...
http://rosettacode.org/wiki/Sierpinski_carpet
Sierpinski carpet
Task Produce a graphical or ASCII-art representation of a Sierpinski carpet of order   N. For example, the Sierpinski carpet of order   3   should look like this: ########################### # ## ## ## ## ## ## ## ## # ########################### ### ###### ###### ### # # # ## # # ## # # # ### ###### ...
#Icon_and_Unicon
Icon and Unicon
$define FILLER "*" # the filler character   procedure main(A)   width := 3 ^ ( order := (0 < \A[1]) | 3 ) write("Carpet order= ",order)   every !(canvas := list(width)) := list(width," ") # prime the canvas   every y := 1 to width & x := 1 to width do # traverse it if IsFilled(x-...
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#Liberty_BASIC
Liberty BASIC
print "AND" for i = 0 to 1 for j = 0 to 1 print "a("; i; ") AND b( "; j; ")" res =a( i) 'call always if res <>0 then 'short circuit if 0 res = b( j) end if print "=>",res next next   print "---------------------------------" print "OR" for i = 0 to 1 f...
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#PARI.2FGP
PARI/GP
dealraw(cards)=vector(cards,i,vector(4,j,1<<random(3))); howmany(a,b,c)=hammingweight(bitor(a,bitor(b,c))); name(v)=Str(["red","green",0,"purple"][v[1]],", ",["oval","squiggle",0,"diamond"][v[2]],", ",["one","two",0,"three"][v[3]],", ",["solid","open",0,"striped"][v[4]]); check(D,sets)={ my(S=List()); for(i=1,#D-2,...
http://rosettacode.org/wiki/Sequence:_smallest_number_with_exactly_n_divisors
Sequence: smallest number with exactly n divisors
Calculate the sequence where each term   an   is the smallest natural number that has exactly   n   divisors. Task Show here, on this page, at least the first  15  terms of the sequence. Related tasks Sequence: smallest number greater than previous term with exactly n divisors Sequence: nth number with exactly...
#Action.21
Action!
CARD FUNC CountDivisors(CARD a) CARD i,count   i=1 count=0 WHILE i*i<=a DO IF a MOD i=0 THEN IF i=a/i THEN count==+1 ELSE count==+2 FI FI i==+1 OD RETURN (count)   PROC Main() DEFINE MAX="15" CARD a,count BYTE i CARD ARRAY seq(MAX)   FOR i=0 TO MAX-1 D...
http://rosettacode.org/wiki/Sequence:_smallest_number_with_exactly_n_divisors
Sequence: smallest number with exactly n divisors
Calculate the sequence where each term   an   is the smallest natural number that has exactly   n   divisors. Task Show here, on this page, at least the first  15  terms of the sequence. Related tasks Sequence: smallest number greater than previous term with exactly n divisors Sequence: nth number with exactly...
#ALGOL_68
ALGOL 68
BEGIN   PROC count divisors = ( INT n )INT: BEGIN INT count := 0; FOR i WHILE i*i <= n DO IF n MOD i = 0 THEN count +:= IF i = n OVER i THEN 1 ELSE 2 FI FI OD; count END # count divisors # ;   I...
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#Genie
Genie
[indent=4] /* SHA-256 in Genie   valac SHA-256.gs ./SHA-256 */   init var msg = "Rosetta code" var digest = Checksum.compute_for_string(ChecksumType.SHA256, msg, -1) print msg print digest   assert(digest == "764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf")
http://rosettacode.org/wiki/SHA-256
SHA-256
SHA-256 is the recommended stronger alternative to SHA-1. See FIPS PUB 180-4 for implementation details. Either by using a dedicated library or implementing the algorithm in your language, show that the SHA-256 digest of the string "Rosetta code" is: 764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf
#Go
Go
package main   import ( "crypto/sha256" "fmt" "log" )   func main() { h := sha256.New() if _, err := h.Write([]byte("Rosetta code")); err != nil { log.Fatal(err) } fmt.Printf("%x\n", h.Sum(nil)) }
http://rosettacode.org/wiki/Sequence:_smallest_number_greater_than_previous_term_with_exactly_n_divisors
Sequence: smallest number greater than previous term with exactly n divisors
Calculate the sequence where each term an is the smallest natural number greater than the previous term, that has exactly n divisors. Task Show here, on this page, at least the first 15 terms of the sequence. See also OEIS:A069654 Related tasks Sequence: smallest number with exactly n divisors Sequence: nth ...
#ALGOL_W
ALGOL W
begin integer max, next, i;   integer procedure countDivisors ( Integer value n ) ; begin integer count, i, i2; count := 0; i := 1; while begin i2 := i * i; i2 < n end do begin if n rem i = 0 then count := count + 2; i...
http://rosettacode.org/wiki/Sequence:_smallest_number_greater_than_previous_term_with_exactly_n_divisors
Sequence: smallest number greater than previous term with exactly n divisors
Calculate the sequence where each term an is the smallest natural number greater than the previous term, that has exactly n divisors. Task Show here, on this page, at least the first 15 terms of the sequence. See also OEIS:A069654 Related tasks Sequence: smallest number with exactly n divisors Sequence: nth ...
#Arturo
Arturo
i: new 0 next: new 1 MAX: 15 while [next =< MAX][ if next = size factors i [ prints ~"|i| " inc 'next ] inc 'i ] print ""
http://rosettacode.org/wiki/SHA-1
SHA-1
SHA-1 or SHA1 is a one-way hash function; it computes a 160-bit message digest. SHA-1 often appears in security protocols; for example, many HTTPS websites use RSA with SHA-1 to secure their connections. BitTorrent uses SHA-1 to verify downloads. Git and Mercurial use SHA-1 digests to identify commits. A US government...
#Haskell
Haskell
module Digestor where import Data.Digest.Pure.SHA import qualified Data.ByteString.Lazy as B   convertString :: String -> B.ByteString convertString phrase = B.pack $ map ( fromIntegral . fromEnum ) phrase   convertToSHA1 :: String -> String convertToSHA1 word = showDigest $ sha1 $ convertString word   main = do ...
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#Julia
Julia
dice5() = rand(1:5)   function dice7() r = 5*dice5() + dice5() - 6 r < 21 ? (r%7 + 1) : dice7() end
http://rosettacode.org/wiki/Seven-sided_dice_from_five-sided_dice
Seven-sided dice from five-sided dice
Task (Given an equal-probability generator of one of the integers 1 to 5 as dice5),   create dice7 that generates a pseudo-random integer from 1 to 7 in equal probability using only dice5 as a source of random numbers,   and check the distribution for at least one million calls using the function created in   Simple R...
#Kotlin
Kotlin
// version 1.1.3   import java.util.Random   val r = Random()   fun dice5() = 1 + r.nextInt(5)   fun dice7(): Int { while (true) { val t = (dice5() - 1) * 5 + dice5() - 1 if (t >= 21) continue return 1 + t / 3 } }   fun checkDist(gen: () -> Int, nRepeats: Int, tolerance: Double = 0.5) { ...
http://rosettacode.org/wiki/Sexy_primes
Sexy primes
This page uses content from Wikipedia. The original article was at Sexy_prime. The list of authors can be seen in the page history. As with Rosetta Code, the text of Wikipedia is available under the GNU FDL. (See links for details on variance) In mathematics, sexy primes are prime numbers that differ from each ot...
#Raku
Raku
use Math::Primesieve; my $sieve = Math::Primesieve.new;   my $max = 1_000_035; my @primes = $sieve.primes($max);   my $filter = @primes.Set; my $primes = @primes.categorize: &sexy;   say "Total primes less than {comma $max}: ", comma +@primes;   for <pair 2 triplet 3 quadruplet 4 quintuplet 5> -> $sexy, $cnt { say ...
http://rosettacode.org/wiki/Show_ASCII_table
Show ASCII table
Task Show  the ASCII character set  from values   32   to   127   (decimal)   in a table format. Other tasks related to string operations: Metrics Array length String length Copy a string Empty string  (assignment) Counting Word frequency Letter frequency Jewels and stones I before E except after C Bioin...
#FreeBASIC
FreeBASIC
function getasc( n as unsigned byte ) as string if n=32 then return "Spc" if n=127 then return "Del" return chr(n)+" " end function   function padto( i as ubyte, j as integer ) as string return wspace(i-len(str(j)))+str(j) end function   dim as unsigned byte r, c, n dim as string disp   for r = 0 to 15...
http://rosettacode.org/wiki/Sierpinski_triangle
Sierpinski triangle
Task Produce an ASCII representation of a Sierpinski triangle of order   N. Example The Sierpinski triangle of order   4   should look like this: * * * * * * * * * * * * * * * ...
#Oz
Oz
declare fun {NextTriangle Triangle} Sp = {Spaces {Length Triangle}} in {Flatten [{Map Triangle fun {$ X} Sp#X#Sp end} {Map Triangle fun {$ X} X#" "#X end} ]} end   fun {Spaces N} if N == 0 then nil else & |{Spaces N-1} end end   fun lazy {Iterate F X} X|{Iterate F {F X}} end ...
http://rosettacode.org/wiki/Sierpinski_carpet
Sierpinski carpet
Task Produce a graphical or ASCII-art representation of a Sierpinski carpet of order   N. For example, the Sierpinski carpet of order   3   should look like this: ########################### # ## ## ## ## ## ## ## ## # ########################### ### ###### ###### ### # # # ## # # ## # # # ### ###### ...
#Io
Io
sierpinskiCarpet := method(n, carpet := list("@") n repeat( next := list() carpet foreach(s, next append(s .. s .. s)) carpet foreach(s, next append(s .. (s asMutable replaceSeq("@"," ")) .. s)) carpet foreach(s, next append(s .. s .. s)) carpet = next ) carpet jo...
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#LiveCode
LiveCode
global outcome function a bool put "a called with" && bool & cr after outcome return bool end a function b bool put "b called with" && bool & cr after outcome return bool end b   on mouseUp local tExp put empty into outcome repeat for each item op in "and,or" repeat for each item x i...
http://rosettacode.org/wiki/Short-circuit_evaluation
Short-circuit evaluation
Control Structures These are examples of control structures. You may also be interested in: Conditional structures Exceptions Flow-control structures Loops Assume functions   a   and   b   return boolean values,   and further, the execution of function   b   takes considerable resources without side effects, an...
#Logo
Logo
and [notequal? :x 0] [1/:x > 3] (or [:x < 0] [:y < 0] [sqrt :x + sqrt :y < 3])
http://rosettacode.org/wiki/Set_puzzle
Set puzzle
Set Puzzles are created with a deck of cards from the Set Game™. The object of the puzzle is to find sets of 3 cards in a rectangle of cards that have been dealt face up. There are 81 cards in a deck. Each card contains a unique variation of the following four features: color, symbol, number and shading. there are...
#Perl
Perl
#!perl use strict; use warnings;   # This code was adapted from the Raku solution for this task.   # Each element of the deck is an integer, which, when written # in octal, has four digits, which are all either 1, 2, or 4.   my $fmt = '%4o'; my @deck = grep sprintf($fmt, $_) !~ tr/124//c, 01111 .. 04444;   # Given a fe...