Searching for "u"

Q:

Which of the following are the debugging windows in .NET?

A) Breakpoints B) Output
C) Immediate D) All the above
 
Answer & Explanation Answer: D) All the above

Explanation:

All the above listed are debugging windows in .NET

Report Error

View Answer Report Error Discuss

Filed Under: .NET

Q:

What are type safe function pointers?

A) Delegates B) Break points
C) Both A and B D) None
 
Answer & Explanation Answer: A) Delegates

Explanation:

A delegate declares a ref type that references a named of anonymous method. Delegates are secure and type-safe.

Report Error

View Answer Report Error Discuss

Filed Under: .NET

Q:

Explain how garbage collection deals with circular referrences?

Answer

The .Net runtime knows about all the references between the objects. It can identify all the circular references that are reachable from the root and hence finalize them to free them all at once if and when needed

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

Q:

Keeping the actoins and attributes together under a single unit is called 

A) Encapsulation B) Information Hiding
C) Polymorphism D) Inheritance
 
Answer & Explanation Answer: A) Encapsulation

Explanation:

Encapsulation is a process of binding the data objects together under a single unit.It is one ofthe elements of oops

Report Error

View Answer Report Error Discuss

Filed Under: Java

Q:

Explain the difference between value types and reference types

Answer

Value type :


 



  • Stores the data

  • The value of value types is stored on the managed stack

  • They are lighter objects 

  • One variable can have only one value


Reference Type :



  • Stores the reference to the data

  • A reference type is allocated on the heap

  • They are heavier objects

  • Several variables can reference the same data


 

Report Error

View answer Workspace Report Error Discuss

Subject: .NET

Q:

Which among the following are the capabilities of the Cursor?

A) It reads every row one by one. B) It can be parameterised and hence are flexible
C) It can be positioned to specific rows D) All the above
 
Answer & Explanation Answer: D) All the above

Explanation:

All the above listed actions are the functions of cursor

Report Error

View Answer Report Error Discuss

Q:

The SQL statements that take care of security and authorization are

A) DDL B) DML
C) DCL D) None
 
Answer & Explanation Answer: C) DCL

Explanation:

Data Control Language takes caare of security and authorization

Report Error

View Answer Report Error Discuss

Filed Under: Software Testing

Q:

Directions : For the Assertion (A) and Reason (R) below, choose the correct alternative 

Assertion (A) : Himalayas once laid under the sea. 

Reason (R)    : Fossils of marine creatures are traced on the Himalayas. 

A) Both A and R are true and R is the correct explanation of A. B) Both A and R are true but R is NOT the correct explanation of A.
C) A is true but R is false. D) A is false but R is true.
 
Answer & Explanation Answer: A) Both A and R are true and R is the correct explanation of A.

Explanation:

Himalayas are the young fold mountains that at one time are believed to lie inside the Tethys sea. This is evident from the recovery of fossils of marine creatures on its peaks. 

Report Error

View Answer Report Error Discuss

Filed Under: Assertion and Reason