Ques:- Name atleast three methods of response object other than Redirect.

Ques:- Using query analyzer, name 3 ways you can get an accurate count of the number of records in a table.
Ques:- If you could change one event from history, what would it be?
Asked In :-
I Logix infotech, L Cube Innovative Solutions, CodeBlock Technologies, Zoondia, Kott Software,
Ques:- What is the advantage of using stored procedure over the SQL queries?
Asked In :-
Pi Techniques, TriSys, Navtech (Navaratan Technologies), Iprimed Education Solutions, Symphony Technologies, Diyar United, Karomi, Kott Software, icds, luminance ai,
Ques:- What are the benefits and “issues” when using cachedmode? How would you tackle those issues?
Ques:- Briefly explain how to specify remoting parameters using config files.
Asked In :-
Sun Technology Integrators, Sweans Technologies, Alcor Solutions, Bindroo Software and Consultants, WebCodeGenie, Kott Software, novigo solutions, hotwax systems, edcil india, cdit,
Right Answer:
To specify remoting parameters using config files in ASP.NET, you can use the `<system.runtime.remoting>` section in the application's configuration file (e.g., `Web.config` or `App.config`). Within this section, you define the remoting services, channels, and clients. For example:
```xml
<configuration>
<system.runtime.remoting>
<application>
<channels>
<add name="tcp" type="System.Runtime.Remoting.Channels.Tcp.TcpChannel, mscorlib" />
</channels>
<client>
<wellknown type="Namespace.ClassName, AssemblyName" uri="tcp://localhost:port/ServiceName" mode="Singleton" />
</client>
</application>
</system.runtime.remoting>
</configuration>
```
Replace `Namespace.ClassName`, `AssemblyName`, `localhost`, `port`, and `ServiceName` with your actual values.
To specify remoting parameters using config files in ASP.NET, you can use the `<system.runtime.remoting>` section in the application's configuration file (e.g., `Web.config` or `App.config`). Within this section, you define the remoting services, channels, and clients. For example:
```xml
<configuration>
<system.runtime.remoting>
<application>
<channels>
<add name="tcp" type="System.Runtime.Remoting.Channels.Tcp.TcpChannel, mscorlib" />
</channels>
<client>
<wellknown type="Namespace.ClassName, AssemblyName" uri="tcp://localhost:port/ServiceName" mode="Singleton" />
</client>
</application>
</system.runtime.remoting>
</configuration>
```
Replace `Namespace.ClassName`, `AssemblyName`, `localhost`, `port`, and `ServiceName` with your actual values.
Ques:- What is the different between boxing and unboxing?
Asked In :-
Addweb solutions, SRS Business Solutions (India), DSM SOFT, Peter Vardy, Aggregate Intelligence, Azeus Systems Philippines, Surya Tech Solutions, Kott Software, dct, cdit,
Right Answer:
Boxing is the process of converting a value type (like int or char) into an object type, while unboxing is the process of converting an object type back into a value type.
Boxing is the process of converting a value type (like int or char) into an object type, while unboxing is the process of converting an object type back into a value type.
Ques:- What is caching?
Asked In :-
SRS Business Solutions (India), Vegam Soft Solutions, Kott Software, Fiport Software India, abm knowledgeware ltd, vinove software and services pvt. ltd., sharp software development india, intellect bizware services pvt .ltd, caap, prokarma,
Right Answer:
Caching is the process of storing frequently accessed data in a temporary storage area, so it can be quickly retrieved when needed, improving application performance and reducing the load on the underlying data source.
Caching is the process of storing frequently accessed data in a temporary storage area, so it can be quickly retrieved when needed, improving application performance and reducing the load on the underlying data source.
Ques:- Explain the concepts and capabilities of cross page posting.
Asked In :-
Khoj Information Technology, SysArc Infomatix, Net-Square Solutions, Kott Software, Secon Pvt Ltd, silverlink technologies, caap, sigma s.a.,
Right Answer:
Cross-page posting in ASP.NET allows a web form to submit data to a different page instead of the page that contains the form. This is achieved by setting the `PostBackUrl` property of a button or other server control. When the form is submitted, the data is sent to the specified target page, which can then access the posted data through the `PreviousPage` property. This capability is useful for scenarios where you want to process data on one page and then redirect to another page for displaying results or further actions.
Cross-page posting in ASP.NET allows a web form to submit data to a different page instead of the page that contains the form. This is achieved by setting the `PostBackUrl` property of a button or other server control. When the form is submitted, the data is sent to the specified target page, which can then access the posted data through the `PreviousPage` property. This capability is useful for scenarios where you want to process data on one page and then redirect to another page for displaying results or further actions.
Ques:- Explain the steps to create a web services and consume it.
Asked In :-
KRIOS Info Solutions, Sun Technology Integrators, Alcor Solutions, Telerik, Nice Solutions, Net-Square Solutions, Kott Software, tectura, technumen inc, ajatus software,
Right Answer:
1. **Create a Web Service:**
- Open Visual Studio and create a new ASP.NET Web Application.
- Choose "Web API" as the project template.
- Define a model class for the data you want to expose.
- Create a controller class that inherits from `ApiController`.
- Implement methods (GET, POST, PUT, DELETE) in the controller to handle requests.
- Configure routing in `WebApiConfig.cs` to define how URLs map to your controller actions.
- Test the web service using tools like Postman or a web browser.
2. **Consume the Web Service:**
- In another ASP.NET application (or any client application), add a reference to the web service.
- Use `HttpClient` to send requests to the web service endpoints.
- Deserialize the response using JSON or XML serializers.
- Handle the data as needed in your application.
1. **Create a Web Service:**
- Open Visual Studio and create a new ASP.NET Web Application.
- Choose "Web API" as the project template.
- Define a model class for the data you want to expose.
- Create a controller class that inherits from `ApiController`.
- Implement methods (GET, POST, PUT, DELETE) in the controller to handle requests.
- Configure routing in `WebApiConfig.cs` to define how URLs map to your controller actions.
- Test the web service using tools like Postman or a web browser.
2. **Consume the Web Service:**
- In another ASP.NET application (or any client application), add a reference to the web service.
- Use `HttpClient` to send requests to the web service endpoints.
- Deserialize the response using JSON or XML serializers.
- Handle the data as needed in your application.
Ques:- What are the main differences between ms access and sqlserver
Asked In :-
Cimpress India, CloudMoyo, Inc, Dhyan Infotech, Alcor Solutions, Intune, Ganit Softech, Cosmos Bank, Capline, Volksoft Technologies, Cloud4C,
Ques:- What is a transaction isolation level and What is the advantage of it? What are different options that we set for a transaction isolation level? Transaction isolation levels are used when we go for transactions in stored procedures used in Transact SQL.
Asked In :-
Energytech Global, Destination technologies, Zorba Consulting, Ideas2IT, Bizacuity Solutions, VBeyond, Polus Software, Sara Analytics, Qualitrix, LogBase Technologies,
Right Answer:
A transaction isolation level defines the degree to which the operations in one transaction are isolated from those in other concurrent transactions. The advantages include controlling data consistency and preventing issues like dirty reads, non-repeatable reads, and phantom reads.
The different options for transaction isolation levels in SQL Server are:
1. **Read Uncommitted**: Allows dirty reads.
2. **Read Committed**: Prevents dirty reads; only committed data is read.
3. **Repeatable Read**: Prevents dirty reads and non-repeatable reads; ensures that if a row is read twice, it will return the same data.
4. **Serializable**: Prevents dirty reads, non-repeatable reads, and phantom reads; ensures complete isolation by locking the range of rows.
5. **Snapshot**: Provides a view of the data as it was at the start of the transaction, preventing locks and allowing for consistent reads.
A transaction isolation level defines the degree to which the operations in one transaction are isolated from those in other concurrent transactions. The advantages include controlling data consistency and preventing issues like dirty reads, non-repeatable reads, and phantom reads.
The different options for transaction isolation levels in SQL Server are:
1. **Read Uncommitted**: Allows dirty reads.
2. **Read Committed**: Prevents dirty reads; only committed data is read.
3. **Repeatable Read**: Prevents dirty reads and non-repeatable reads; ensures that if a row is read twice, it will return the same data.
4. **Serializable**: Prevents dirty reads, non-repeatable reads, and phantom reads; ensures complete isolation by locking the range of rows.
5. **Snapshot**: Provides a view of the data as it was at the start of the transaction, preventing locks and allowing for consistent reads.
Ques:- What's the use of SQL Profiler?
Asked In :-
Sun Technology Integrators, Elite Software Solutions, Tredence Analytics Solutions, On Demand Agility Software, DSM SOFT, V2STech Solutions, Prospecta, O Clock Software, Yagna iQ, ColorTokens,
Right Answer:
SQL Profiler is a tool used to monitor and analyze SQL Server events, allowing users to capture and replay SQL queries, track performance issues, and troubleshoot database problems.
SQL Profiler is a tool used to monitor and analyze SQL Server events, allowing users to capture and replay SQL queries, track performance issues, and troubleshoot database problems.
Ques:- What is a view?
Asked In :-
Indocosmo Systems, Sardonyx Technologies, APPS Associates Pvt., TriSys, Decision Minds India, Jain Software, Cynet Systems, Mobisy, Tripod Technologies, BridgeLabz Solutions,
Ques:- Which virtual table does a trigger use?
Asked In :-
Addweb solutions, Motherson Sumi Infotech Design, Digite Infotech, XBRL Ultima, Novatech Software, i-exceed technology solutions, Leeway Hertz, UCA, Clover Technologies, RORO,
Ques:- What is the role of the Alfresco Digital Workspace
Asked In :-
Cybage Software, Keyideas Infotech, Grid Logic Software, SenecaGlobal IT Services, Coviam Technologies, PowerSchool, Citrus Informatics (India), Arya Omnitalk Wireless Solutions, Williams Lea India, Basware India,
Right Answer:
The Alfresco Digital Workspace is a modern, configurable user interface for interacting with the Alfresco repository. It allows users to easily manage and collaborate on content, participate in workflows, and search for information.
The Alfresco Digital Workspace is a modern, configurable user interface for interacting with the Alfresco repository. It allows users to easily manage and collaborate on content, participate in workflows, and search for information.
Ques:- What is the role of the assembler, linker, and loader in ARM compilation
Asked In :-
Ziffity Solutions, Solitaire Infosys, ISKPRO, Adnate IT Solutions, Manipal Technologies, Adapty Solutions, Clinton Health Access Initiative, Anand Rathi IT, Everi India, ProPhoenix Technologies,
Right Answer:
The assembler converts assembly language code into machine code (object files). The linker combines object files and resolves references between them to create an executable file. The loader loads the executable into memory and prepares it for execution.
The assembler converts assembly language code into machine code (object files). The linker combines object files and resolves references between them to create an executable file. The loader loads the executable into memory and prepares it for execution.
Ques:- How do you switch between ARM and Thumb modes in code
Asked In :-
Bold Technology Systems, Clear Trail Technologies, FUTURISM TECHNOLOGIES PVT, Valethi, Mass Software Solutions, Uolo Technology, ELEVATE SERVICES INDIA, Innominds Software (P), Proseon Technologies, Xoriant Solutions,
Right Answer:
To switch between ARM and Thumb modes in code, use the `BX` instruction with the least significant bit (LSB) set to 1 for Thumb mode and 0 for ARM mode. For example, to switch to Thumb mode, use `BX Rn` where `Rn` contains an address with the LSB set to 1. To switch back to ARM mode, use an address with the LSB set to 0.
To switch between ARM and Thumb modes in code, use the `BX` instruction with the least significant bit (LSB) set to 1 for Thumb mode and 0 for ARM mode. For example, to switch to Thumb mode, use `BX Rn` where `Rn` contains an address with the LSB set to 1. To switch back to ARM mode, use an address with the LSB set to 0.
Ques:- What are client libraries (clientlibs) in AEM and how do you use them for front-end resource management
Asked In :-
Spectra Medix India, Webvillee Technology, Muvi Entertainment, SysTrack Solution, HashRoot Technologies, Xobin, Girmiti Software, IDCube Identification Systems, Solugenix India, NISC Exports Services (p),
Right Answer:
Client libraries (clientlibs) in AEM are collections of front-end resources, such as CSS and JavaScript files, that are organized for efficient loading and management. They allow developers to group related assets, define dependencies, and optimize resource delivery. To use clientlibs, you create a folder structure under `/apps` or `/libs`, define a `clientlib` node with properties like `categories` and `js`/`css` arrays, and include them in your AEM components or pages using the `cq:includeClientLib` or `data-sly-include` methods.
Client libraries (clientlibs) in AEM are collections of front-end resources, such as CSS and JavaScript files, that are organized for efficient loading and management. They allow developers to group related assets, define dependencies, and optimize resource delivery. To use clientlibs, you create a folder structure under `/apps` or `/libs`, define a `clientlib` node with properties like `categories` and `js`/`css` arrays, and include them in your AEM components or pages using the `cq:includeClientLib` or `data-sly-include` methods.
Ques:- What are the different components of the ARM toolchain
Asked In :-
STIC SOFT E-SOLUTIONS, Oodles Technologies, 9series Solutions, Acquia Inc., HealthTech India, TripStack (ALP Consulting), Highbar Technocrat, Talent Toppers, Solugenix India, Novatech Software,
Right Answer:
The different components of the ARM toolchain are:
1. **Compiler** (e.g., ARM GCC)
2. **Assembler** (e.g., ARM Assembler)
3. **Linker** (e.g., ARM Linker)
4. **Debugger** (e.g., ARM Debugger)
5. **Libraries** (e.g., ARM Standard Libraries)
6. **Build Tools** (e.g., Make, CMake)
The different components of the ARM toolchain are:
1. **Compiler** (e.g., ARM GCC)
2. **Assembler** (e.g., ARM Assembler)
3. **Linker** (e.g., ARM Linker)
4. **Debugger** (e.g., ARM Debugger)
5. **Libraries** (e.g., ARM Standard Libraries)
6. **Build Tools** (e.g., Make, CMake)