Use the keyword NotOverridable in VB.NET and sealed in C#.
Type: Posts; User: chinmay.sahoo; Keyword(s):
Use the keyword NotOverridable in VB.NET and sealed in C#.
ADO.NET is stateless mechanism. I can treat the ADO.Net as a separate inmemory database where in I can use relationships between the tables and select insert and updates to the database. I can update...
The cursor position is maintained when the page gets refreshed due to the server side validation and the page gets refreshed
Scripting is separated from the HTML, Code is compiled as a DLL, these DLLs can be executed on the server.
During development process you will need strong name keys to be exposed to developer which is not a good practice from security aspect point of view.In such situations you can assign the key later on...
By using events you can make your applications dynamic and interactive. To handle a specific event, you need to select the appropriate event property on the properties sheet and write an event...
Object-oriented programming (especially in Java, C++, or C#) has become the dominant software-development methodology.
This led to the development of an object-oriented data model that can be seen...
Beyond encoding data in a textual format, an XML document doesn't do much of anything on its own. The true power of XML lies in the tools that process it. In this section, we take a quick tour of the...
• Opportunists have a true gift for identifying career prospects, whether inside their organization, in competing companies, or in their own business startups.
• Opportunists find challenge in doing...
1. Find Your Purpose. Most people spend a lifetime trying to find their calling in life. The assessments included in Part I of this book can help you do just that by guiding you to define the needs...
The following are the differences between strcpy() and memcpy():
When a user on a PC accesses a website, URL resolution for the website name has to be performed. This is done by the DNS protocol. This request has to be sent to a DNS server, for which the IP...
Every route entry would have a metric. If there are two default gateways, there would be two default entry. The entry which has a lower metric value would be taken by the packets.
WEP uses RC4 and WPA uses TKIP and AES for encryption.
Although the actual GET method of form handling is deprecated, the style of URL associated with it turns out to be very useful for site navigation. This is especially true for dynamically generated...
JavaScript is just one of many programming languages with DOM support. What makes the combination of JavaScript and the DOM so exciting is the environment where they are used. Whereas most...
BDB (BerkeleyDB) is transaction safe storage engine originally developed at U.C. Berkeley. It is now developed by Sleepycat Software, Inc. (an Oracle company now).
A series of keystrokes and mouse clicks that can be abbreviated into a single keystroke or mouse click
A transaction is a logical unit of work requested by a user to be applied to the database objects. MySQL server introduces the transaction concept to allow users to group one or more SQL statements...
A system utility that comes with Windows that allows the use to change a variety if different Windows and system settings
PEAR is the next revolution in PHP. This repository is bringing higher level programming to PHP. PEAR is a framework and distribution system for reusable PHP components. It eases installation by...