Level Four: Cheatcode
Stage One:
while var_a < input.length {
var_b = var_a + 1;
while var_b < input.length {
if input[var_b] < input [var_a] {
var_c = input[var_b];
input[var_b] = input[var_a];
input[var_a] = var_c;
}
var_b++;
}
var_a++;
}
return input;
Stage Two:
var_a = [];
foreach var_b in input.sort {
while var_b != var_c {
var_a.push(var_c++);
}
var_c++;
}
return var_a;
Stage Three:
var_a = “”;
foreach var_b in input {
if var_a != var_b.sort && var_a != “” {
return false;
}
var_a = var_b;
}
return true;
Level Five: Corrupted
Stage one:
var_a = input.length -1;
while var_a > -1 {
var_b = var_b + input[var_a] * pow(2, input.length – var_a – 1);
var_a–;
}
return var_b;
Stage two:
if input == 1 {
return false;
}
var_a = 2;
while var_a < input {
if mod(input, var_a) == 0 {
return false;
}
var_a++;
}
return true;
Stage three:
while var_a < input.length – 1 { if input[var_a] > input[var + 1] {
return false;
}
var_a++;
}
return true;
Level Six: Cyber Attack
Stage One:
while var_a < input.length {
var_b = var_a;
while var_b != input[var_a] {
input.insert(var_a++, var_b++);
}
return input;
}
OR
var_a = [];
var_b = input.pop + 1;
while var_c < var_b {
var_a.push(var_c);
var_c++;
}
return var_a;
Stage two:
if input[0] == “)” {
return false;
}
foreach var_a in input {
if var_a == “(” {
var_b++;
}
else {
var_b–;
}
}
return var_b == 0;
Stage three:
return input.push(input.remove(0));