Starts With La. The Wildcard Character Is %, The Proper Query With LIKE Would Involve La%'

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

1. What’s the advantage of using System.Text.StringBuilder over System.String?

StringBuilder is more efficient in the cases,


where a lot of manipulation is done to the text. Strings are immutable, so each time it’s being operated on, a new instance is created.
2. Can you store multiple data types in System.Array? No.
3. What’s the difference between the System.Array.CopyTo() and System.Array.Clone()? The first one performs a deep copy of
the array, the second one is shallow.
4. How can you sort the elements of the array in descending order? By calling Sort() and then Reverse() methods.
5. What’s the .NET datatype that allows the retrieval of data by a unique key? HashTable.
6. What’s class SortedList underneath? A sorted HashTable.
7. Will finally block get executed if the exception had not occurred? Yes.
8. What’s the C# equivalent of C++ catch (…), which was a catch-all statement for any possible exception? A catch block that
catches the exception of type System.Exception. You can also omit the parameter data type in this case and just write catch {}.
9. Can multiple catch blocks be executed? No, once the proper catch code fires off, the control is transferred to the finally block (if there
are any), and then whatever follows the finally block.
10. Why is it a bad idea to throw your own exceptions? Well, if at that point you know that an error has occurred, then why not write
the proper code to handle that error instead of passing a new Exception object to the catch block? Throwing your own exceptions signifies
some design flaws in the project.
11. What’s a delegate? A delegate object encapsulates a reference to a method. In C++ they were referred to as function pointers.
12. What’s a multicast delegate? It’s a delegate that points to and eventually fires off several methods.
13. How’s the DLL Hell problem solved in .NET? Assembly versioning allows the application to specify not only the library it needs to
run (which was available under Win32), but also the version of the assembly.
14. What are the ways to deploy an assembly? An MSI installer, a CAB archive, and XCOPY command.
15. What’s a satellite assembly? When you write a multilingual or multi-cultural application in .NET, and want to distribute the core
application separately from the localized modules, the localized assemblies that modify the core application are called satellite assemblies.
16. What namespaces are necessary to create a localized application? System.Globalization, System.Resources.
17. What’s the difference between // comments, /* */ comments and /// comments? Single-line, multi-line and XML
documentation comments.
18. How do you generate documentation from the C# file commented properly with a command-line compiler? Compile it
with a /doc switch.
19. What’s the difference between <c> and <code> XML documentation tag? Single line code example and multiple-line code
example.
20. Is XML case-sensitive? Yes, so <Student> and <student> are different elements.
21. What debugging tools come with the .NET SDK? CorDBG – command-line debugger, and DbgCLR – graphic debugger. Visual
Studio .NET uses the DbgCLR. To use CorDbg, you must compile the original C# file using the /debug switch.
22. What does the This window show in the debugger? It points to the object that’s pointed to by this reference. Object’s instance data is
shown.
23. What does assert() do? In debug compilation, assert takes in a Boolean condition as a parameter, and shows the error dialog if the
condition is false. The program proceeds without any interruption if the condition is true.
24. What’s the difference between the Debug class and Trace class? Documentation looks the same. Use Debug class for debug
builds, use Trace class for both debug and release builds.
25. Why are there five tracing levels in System.Diagnostics.TraceSwitcher? The tracing dumps can be quite verbose and for some
applications that are constantly running you run the risk of overloading the machine and the hard drive there. Five levels range from
None to Verbose, allowing to fine-tune the tracing activities.
26. Where is the output of TextWriterTraceListener redirected? To the Console or a text file depending on the parameter passed to
the constructor.
27. How do you debug an ASP.NET Web application? Attach the aspnet_wp.exe process to the DbgClr debugger.
28. What are three test cases you should go through in unit testing? Positive test cases (correct data, correct output), negative test
cases (broken or missing data, proper handling), exception test cases (exceptions are thrown and caught properly).
29. Can you change the value of a variable while debugging a C# application? Yes, if you are debugging via Visual Studio.NET, just
go to Immediate window.
30. Explain the three services model (three-tier application). Presentation (UI), business (logic and underlying code) and data (from
storage or other sources).
31. What are advantages and disadvantages of Microsoft-provided data provider classes in ADO.NET? SQLServer.NET data
provider is high-speed and robust, but requires SQL Server license purchased from Microsoft. OLE-DB.NET is universal for accessing
other sources, like Oracle, DB2, Microsoft Access and Informix, but it’s a .NET layer on top of OLE layer, so not the fastest thing in the
world. ODBC.NET is a deprecated layer provided for backward compatibility to ODBC engines.
32. What’s the role of the DataReader class in ADO.NET connections? It returns a read-only dataset from the data source when the
command is executed.
33. What is the wildcard character in SQL? Let’s say you want to query database with LIKE for all employees whose name
starts with La. The wildcard character is %, the proper query with LIKE would involve ‘La%’.
34. Explain ACID rule of thumb for transactions. Transaction must be Atomic (it is one unit of work and does not dependent on
previous and following transactions), Consistent (data is either committed or roll back, no “in-between” case where something has been
updated and something hasn’t), Isolated (no transaction sees the intermediate results of the current transaction), Durable (the values
persist if the data had been committed even if the system crashes right after).
35. What connections does Microsoft SQL Server support? Windows Authentication (via Active Directory) and SQL Server
authentication (via Microsoft SQL Server username and passwords).
36. Which one is trusted and which one is untrusted? Windows Authentication is trusted because the username and password are
checked with the Active Directory, the SQL Server authentication is untrusted, since SQL Server is the only verifier participating in the
transaction.
37. Why would you use untrusted verificaion? Web Services might use it, as well as non-Windows applications.
38. What does the parameter Initial Catalog define inside Connection String? The database name to connect to.
39. What’s the data provider name to connect to Access database? Microsoft.Access.
40. What does Dispose method do with the connection object? Deletes it from the memory.
41. What is a pre-requisite for connection pooling? Multiple processes must agree that they will share the same connection, where every
parameter is the same, including the security settings.

Windows Communication Foundation (WCF) is a part of the .NET Framework that provides a
unified programming model for rapidly building service-oriented applications that communicate
across the web and the enterprise.

WCF comes up as a replacement for Remoting and Web service in donet.

Web Services:

1. It can be accesses only over HTTP.


2. It works in stateless environment.
3. It supports only the data types defined in the XSD type system, limiting the number of
objects that can be serialized.
4. It support interoperability across platforms, and are ideal for heterogeneous
environments.

.Net Remoting:

1. It can be accessed over any protocol


2. Provide support for both stateful and stateless environments through Singleton and
SingleCall objects
3. Using binary communication, .NET Remoting can provide support for rich type system.
4. It requires the client be built using .NET, enforcing homogenous environment.

WCF Service:

1. WCF support of almost all protocols like TCP, MSMQ, NamedPipe , Peer2Peer and
HTTP.
2. WCF Service works asynchronously.
3. WCF service can be hosted on self hosting application, IIS and WAS (windows
application service).
4. WCF is used to implement Service oriented architecture. Service oriented architecture
means collection of services communicated with each other with the help of messages
1. A user has a service with a one-way operation that includes a fault contract,
and he
gets an exception when he tries to host the service. Why?
    This happens because, to return faults, the service needs some form of a two-way
communication channel in place, which is not the case with one-way operations.

2. A user has a service he wants to expose on the Internet, and it needs to send
notifications
out to its consumers. Would the WCF Duplex MEP be a good choice for
implementing this?
    No. The WCF Duplex MEP can be problematic to enable, even inside an enterprise.
Its implementation depends upon the service establishing a connection back to the
consumer, which can’t happen in certain scenarios, such as when the client’s machine uses
NAT behind a firewall. On the Internet, where you are never certain
where your consumers are coming from, this type of callback channel would rarely, if ever,
work. When you factor in the security risks it could pose and the scalability concerns with
the fact that callback channels require the presence of sessions
between client and service, it isn’t a feasible solution.

3. You have a Data contract specifying a Person class from which you derive a
Customer class. Does a Customer object automatically have a Data contract as
well?
    No. The Data contract is not inherited, so any derived class, such as the Customer class,
would have to be explicitly declared as having a Data contract as well.

4. Your company has its own proprietary authentication mechanism, and you are
required to authenticate every message coming into the service. What is the best
way to handle using this mechanism with WCF?
    Likely the best way to handle this would be to design a Message contract that accepts
these proprietary authentication tokens in the header.

5. Can you support the Rpc SOAP style by using the DataContractSerializer?
    Yes. You need only adorn your service with the DataContractFormatAttribute and
explicitly set the attribute’s Style property to OperationFormatStyle.Rpc.

6. What does the “ABCs of endpoints” refer to?


    The ABCs of endpoints refers to the three required elements that comprise a service
endpoint: address, binding, and contract.

7. Which standard binding could be used for a service that was designed to replace
an existing ASMX Web service?
    The basicHttpBinding standard binding was designed to expose a service as if it were an
ASMX Web service. This enables you to support existing clients as applications are upgraded
to WCF.

8. What is the main disadvantage of using IIS to host a service?


    Using IIS to host your services means that you will not be able to support non-HTTP
protocols such as TCP, named pipes, and MSMQ. You will have access to the many built-in
features available with IIS such as process recycling and messagebased
activation.
9. Which file specifies the types that your service will expose in IIS?
    Service types are exposed through IIS by using the service file. This file must have an
.svc file extension and should reside in the application directory for your IIS hosting
application. This file will include an @ServiceHost directive, which specifies
the service name and language for the service code files. These files should be located in an
App_Code subdirectory.

You might also like