Data collection: list, tuple, dict, set
Python has four types of data collections, namely list, tuple, dict, set
List, List
List is an ordered and variable data collection in Python. Its elements can be added or removed. The representation method of List is to use a [] to enclose the elements, and separate the elements with a, sign. For example [2,'hah',True].
Create a List
list = [1,2,3,'apple',true] List中的元素的数据类型可以不同,除了整数、浮点数、布尔值、字符串等,也可以是list或则其他。
The length of the List
You can use the len() function to get the length of the list.
Get elements of List
You can use list[index] to get an element in the list from front to back.
You can also use list[-n] to get the nth element from the back to the front in the list.
Append elements append()
For example, list.append('haha') can add an element after the list.
Insert element insert()
For example, list.insert(2, "haha") adds an element to position 3 of the list.
Delete elements pop()
list.pop() deletes the last element of the list by default. list.pop(i) deletes the i+1th element.
Replace elements in the list
list[2]='banana'
Tuple, Tuple
Tuple is an ordered but immutable list in Python. Once a Tuple is created, it cannot be modified. The representation method is to use a pair of () to contain the elements and separate them with,.
For example: (1,2,3). But for a tuple that only uses one element, you need to add one after the element, such as (1,) to distinguish it from the operator ().
The acquisition of Tuple elements
is consistent with list, that is, tuple[index].
Dict Dictionary
The dictionary in Python is a data format stored in key-value format. The key in Dict is the only immutable object.
Dict creation method
my_dict = {'name':'Charlie','age':20,'gender':'male'}
Get value based on key
my_dict['name']
But sometimes we are not sure whether the key we want is in the dict. If not, but we obtain the value according to the above method, KeyError will be reported.
We have two ways to solve it
Use in to determine whether the key exists. key in dict
my_dict.get('name'). If the key does not exist, None is returned. You can also know the return value when the key does not exist, that is, my_dict.get('name','value_if_not_existed')
Delete key-value
my_dict.pop('name')
Dict与List相比,Dict查询、插入的速度快,与Dict大小无关。占用内存大。List查询、插入的速度与List大小呈反比,但是占用内存小。
Set
Set是一个有序且不重复的数据集合。Set中的元素都必须是不可变对象。
创建set
s = set([1,2,3,5,4,3])
创建时重复的元素将被自动删除。
添加元素
s.add('9')
删除元素
s.remove('9')
若元素'9'不存在,则会报KeyError错误。

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

PHP is mainly procedural programming, but also supports object-oriented programming (OOP); Python supports a variety of paradigms, including OOP, functional and procedural programming. PHP is suitable for web development, and Python is suitable for a variety of applications such as data analysis and machine learning.

PHP is suitable for web development and rapid prototyping, and Python is suitable for data science and machine learning. 1.PHP is used for dynamic web development, with simple syntax and suitable for rapid development. 2. Python has concise syntax, is suitable for multiple fields, and has a strong library ecosystem.

Python is more suitable for beginners, with a smooth learning curve and concise syntax; JavaScript is suitable for front-end development, with a steep learning curve and flexible syntax. 1. Python syntax is intuitive and suitable for data science and back-end development. 2. JavaScript is flexible and widely used in front-end and server-side programming.

VS Code can run on Windows 8, but the experience may not be great. First make sure the system has been updated to the latest patch, then download the VS Code installation package that matches the system architecture and install it as prompted. After installation, be aware that some extensions may be incompatible with Windows 8 and need to look for alternative extensions or use newer Windows systems in a virtual machine. Install the necessary extensions to check whether they work properly. Although VS Code is feasible on Windows 8, it is recommended to upgrade to a newer Windows system for a better development experience and security.

PHP originated in 1994 and was developed by RasmusLerdorf. It was originally used to track website visitors and gradually evolved into a server-side scripting language and was widely used in web development. Python was developed by Guidovan Rossum in the late 1980s and was first released in 1991. It emphasizes code readability and simplicity, and is suitable for scientific computing, data analysis and other fields.

VS Code can be used to write Python and provides many features that make it an ideal tool for developing Python applications. It allows users to: install Python extensions to get functions such as code completion, syntax highlighting, and debugging. Use the debugger to track code step by step, find and fix errors. Integrate Git for version control. Use code formatting tools to maintain code consistency. Use the Linting tool to spot potential problems ahead of time.

In VS Code, you can run the program in the terminal through the following steps: Prepare the code and open the integrated terminal to ensure that the code directory is consistent with the terminal working directory. Select the run command according to the programming language (such as Python's python your_file_name.py) to check whether it runs successfully and resolve errors. Use the debugger to improve debugging efficiency.

VS Code extensions pose malicious risks, such as hiding malicious code, exploiting vulnerabilities, and masturbating as legitimate extensions. Methods to identify malicious extensions include: checking publishers, reading comments, checking code, and installing with caution. Security measures also include: security awareness, good habits, regular updates and antivirus software.
