Lecture 26: List Access, Hashing, Simulations, and Wrap-Up