- Why would you use untrusted verificaion? Web Services might use it, as well as non-Windows applications.
- What does the parameter Initial Catalog define inside Connection String? The database name to connect to.
- What’s the data provider name to connect to Access database? Microsoft.Access.
- What does Dispose method do with the connection object? Deletes it from the memory.
- What is a pre-requisite for connection pooling? Multiple processes must agree that they will share the same connection, where every parameter is the same, including the security settings.
Interview Questions C Sharp set-6
Posted by
study
|
Tuesday 7 June 2011
Popular Posts
-
What is software engineering, anyway? Some basic def...
-
Technical Interview Questions 1. Which is the best page replacement algorithm and why? 2. What is software life cycle? 3. How much time...
-
How are Java source code files named? A Java source code file takes the name of a public class or interface that is defined within th...
-
Q: What are Checked and UnChecked Exception? A: A checked exception is some subclass of Exception (or Ex...
-
What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildin...
-
Q: Is next a keyword in Java? A: No, next is not a keyword. Q: ...
-
What is PPP protocol? Explain PPP packet format. Point to Point protocol helps communication between 2 computers over a serial cable, phon...
-
Explain user defined exceptions in oracle. A User-defined exception has to be defined by the programmer. User-defined exceptions are decla...
-
1. For a parallel plate capacitor which is being charged out of the following the incorrect statement is – a). Energy stored in the capaci...
0 comments:
Post a Comment