User talk:Lemonz

From Esolang
Jump to navigation Jump to search

Mission: Make this as long as possible.



When you have the time, I have a couple questions about your language Painfuck. - Bangyen (talk) 01:05, 5 May 2022 (UTC)


  • RE: Ok yea, I suck at documenting this kind of thing, but here's an explanation:
  • To get the right commands:
  • Apply decrypt:
    • Get all the remaining characters after the one that was just run,
    • Find the character AFTER state.
    • Then, Find the corresponding character in the BEFORE state
    • Thats the new character in that position, place it there and remove the old.
  • So:
  • pso is the starting state
  • the p is kept as is.
  • the s and o are changed to the corresponding characters: s corresponds to t, and o corresponds to s.
  • Keep the t as so, and change the third character (the substituted s) to the corresponding character (t)

(insert line break)

  • When the interpreter runs the program. do this to get the new command:
    • Get all the remaining characters after the one that was just run,
    • Find the character BEFORE state.
    • Then, Find the corresponding character in the AFTER state
    • Thats the new character in that position, place it there and remove the old.
  • so, the excample ptt is run like this:
  • keep p as is
  • the t's are encrypted to s (the corresponding)
  • run the s normally, then encrypt the next s to an o
  • these two processes should result in each other, as the program after the interpreter does the encrypting is the same as what you wanted to write.

Sorry, I should've specified that my questions are located on the discussion page for Painfuck, but I appreciate the more in-depth explanation of the decryption process. - Bangyen (talk) 12:43, 5 May 2022 (UTC)

I also have some questions about %^2^-1 located on its discussion page, but those are less important. - Bangyen (talk) 13:32, 5 May 2022 (UTC)


For Painfuck,

  • Are a and b supposed to act as brackets? As of right now, each command moves the command pointer to the nearest instance of the other, as opposed to moving the pointer to the corresponding instance of the other. For example, when used as brackets, the following code terminates:
    aabpb
    When used as currently specified, the aforementioned code does not terminate. They are meant to be [They are meant to be, edit the page if needed.]
  • If I wanted to write a program that executed the following commands (pasb), how would I encrypt it? Would it be encrypted as plbh, i.e. when the command pointer returns to the beginning of a loop, does it decrypt the commands in the loop again, does it continue decrypting all commands after the loop, or does it pause decryption until the command pointer exits the loop? [RE:

Basically this is the weirdest part, it works like this: decrypt everything while outside brackets.

Once it reaches the brackets. do not encrypt the brackets, but: Encrypt everything inside brackets, if it loops, do not redo the decryption process for whatever is inside brackets. if brackets are nested, and the pointer enters, the brackets while NOT inside them do get decrypted, but once entered, apply this whole mess again.

]

  • When negative odd numbers are halved, are they rounded down or up? [RE: by integer rounding, still down]
  • When asking about what happens when you attempt to clone the cell to the left when you're at the start of the tape, I was attempting to ask whether the value at the beginning of the tape would change since there's no cell to the left of the start of the tape. [RE: It doesn't change.]

For %^2^-1, my comment about the Hello, world! program that's currently on display was meant to illuminate the fact that it neither outputs in all uppercase nor does it output the correct letters (regardless of case).

- Bangyen (talk) 20:05, 6 May 2022 (UTC)


Using the following program as reference (ptto), would the output be? 26 (2 * (1 + 3 + 9)), 24 (2 * (3 + 9)), 18 (2 * 9), 12 (2 * (3 + 3)), 6 (2 * 3), or 0? Also, I'm pretty sure the correct counting program is pticjdy.

- Bangyen (talk) 03:52, 8 May 2022 (UTC)

  1. The counter program would be totally different since every command after gets an extra layer of encryption.
  2. Is ptto encrypted or pseudocode?

Whoops, ptto is unencrypted. Also, I didn't add a command; I just fixed a command that was encrypted incorrectly. - Bangyen (talk) 17:24, 8 May 2022 (UTC)

RE: Alright then that makes life easier. So that would result in: Two gets added. That gets done 3 times (by definition of t) So the cell is at 8. Then, the do 3 times is done 3 times. Doing the +2 another 3x3 = 9 times. so the end result is 26

Is there an official implementation of Three variable modification language

I have stumbled upon your programming language Three variable modification language, and I would like to create a book in Wikibooks about writing a hello world program in it. I’m curious to know is there an official implementation? I plan to write my own implementation based on the specifications p regardless but I’m just curious to know. If there is one, you should link to it in the article. P.S. feel free to contact me in Wikibooks (the same username). -Slava Ukraini Heroyam Slava 123 (talk) 16:53, 18 September 2022 (UTC)

RE: Currently not. Im being overloaded with other things right now so I dont have the time to.

Ok, I see. I will be sure to notify you when I actually get to implementing it. -Slava Ukraini Heroyam Slava 123 (talk) 23:41, 26 September 2022 (UTC)

RE: Aight, got it.