What is the purpose of the following segment? If ( !IsPostBack) { sqldataAdapter1.Fill (dsusers1); DataGrid1.DataBind (); } a) To populate the DataAdapter the first time the web page id displayed. b) To populate the DataSet every time the web page is displayed. c) To populate the DataAdapter every time the web page is displayed. d)To populate the DataSet the first time the web page is displayed.
2 7391What does the following SQL statement return, assuming that all tables and column names are correct? SELECT FirstName, StreetAddress FROM Employees JOIN AddressBook ON Employees.EmpID = AddressBook.EmpID a) Nothing, the JOIN syntax is wrong. b) All the records form the Employees table, and only the matching ones form the StreetAddress table. c) All the records from the StreetAddress table and only the matching records form the Employees table. d) Only the matching records from the two tables.
4 9007You are using the try? catch block seen in the following code segment, but no exceptions are ever caught by the catch block. What is the problem? SqlConnection cn =new sqlConnection(strSQL); SqlDataSet ds; try { cn.open(); //perform the data processing steps ??.. } catch (OleDbException e) { ?.. } a) The exception class is wrong; it should be sqlErrors. b) The exception class is wrong; it should be sqlSyntaxExceptios. c) The exception class is wrong; it should be sqlExceptions. d) The exception class is wrong; it should be sqlExcptions.
2 6443What line in the following XML document will generate an error?
can anyone give me example of the following:- low severity & high priority medium severity & medium priority high severity & low priority
4 9660Which one of the following describes characteristics of "protected" inheritance? a) The base class has access only to the public or protected members of the derived class. b) The derived class has non-public, inheritable, access to all but the private members of the base class. c) The derived class has access to all members of the base class. d) The private members of the base class are visible within the derived class. e) Public members of the derived class are privately accessible from the base class.
4 10553Which of the folowing is not correct a. (x+y)'=x'.y' b. (x'+y')'=x.y c. (x'.y')'=x+y d. (x'+y')'=x'.y'
2 5986which one of following is not memory management model? choices are buddy system, monitors, paging, swapping
6 12303Which of following is used for back-up files? (a) compress (b) Tar (c) make (d) all the above
1 5641Result of the following program is main() { int i=0; for(i=0;i<20;i++) { switch(i) case 0:i+=5; case 1:i+=2; case 5:i+=5; default i+=4; break;} printf("%d,",i); } } a)0,5,9,13,17 b)5,9,13,17 c)12,17,22 d)16,21 e)syntax error
IBM,
8 30168Which of the following API is used to hide a window a) ShowWindow b) EnableWindow c) MoveWindow d) SetWindowPlacement e)None of the above
IBM,
2 20658what will the following program do? void main() { int i; char a[]="String"; char *p="New Sring"; char *Temp; Temp=a; a=malloc(strlen(p) + 1); strcpy(a,p); //Line no:9// p = malloc(strlen(Temp) + 1); strcpy(p,Temp); printf("(%s, %s)",a,p); free(p); free(a); } //Line no 15// a) Swap contents of p & a and print:(New string, string) b) Generate compilation error in line number 8 c) Generate compilation error in line number 5 d) Generate compilation error in line number 7 e) Generate compilation error in line number 1
IBM,
1 8453In the following code segment what will be the result of the function, value of x , value of y { unsigned int x=-1; int y; y = ~0; if(x == y) printf("same"); else printf("not same"); } a) same, MAXINT, -1 b) not same, MAXINT, -MAXINT c) same , MAXUNIT, -1 d) same, MAXUNIT, MAXUNIT e) not same, MAXINT, MAXUNIT
IBM,
1 7934
What are advantages of using Java?s layout managers than windowing systems?
How to synchronize slow growing bacterial species of Cyanobacteria, Thiobacilli, Mycoplasma?
What Testing process U r following in ur organization?
what r the strategies & methodologies r u following in preperation of test cases based on usecase?
Which one of the following activities is the most efficient and most cost effective at identifying defects? 1. Prototyping 2. Unit test 3. Beta test 4. Design/code inspection 5. Risk analysis
The Following Characterstics posses some XYZ company. * Uses formal standards and policies * Conducts software inspections * Has advanced configuration management and change control * Uses CASE tools * Has a software engineering process group * Gathers metrics on process and quality * Requires that developers have formal software engineering training * Practices continued process improvement Based on aboue , Tell me which CMM Level is the company..? 1. Level 1 - Initial 2. Level 2 - Repeatable 3. Level 3 - Defined 4. Level 4 - Managed 5. Level 5 - Optimizing
Rules of civil law are different than that of criminal law. Are you prepared to enter this knowing that there is little guidance from within our office?
During a heart attack, blood flowing to the heart muscle is interrupted by blockage of a coronary artery. How would you expect the metabolism in the heart to change?
A 22 year old woman collapses following Neville Barnes forceps delivery of the second twin. She is hypotensive and tachycardic and the estimated blood loss is now 800ml. How would you manage this situation?
I'm new to sewing, and I need to know what are some good pieces to start with?
Which namespace do the classes, allowing you to support COM functionality, are located?
Who was the first person to recognize that true flies have two wings and gave them the name ?Diptera??
Who was the first person to recognize that true flies have two wings and gave them the name ?Diptera??
What is the trouble in growing streptococcus species?
What are the Conditions for growing slow-growing mycobacteria?