.NET Tutorials, Forums, Interview Questions And Answers
Welcome :Guest
 
Sign In
Register
 
Win Surprise Gifts!!!
Congratulations!!!


Top 5 Contributors of the Month
david stephan

Home >> Interview Question >> Others >> Post New Question Subscribe to Interview Questions

Database:List step to be performed to work with
cursor?

Posted By :shankey     Posted Date :July 26, 2011    Points :40   Category :Others 
Declare cursor,Open cursor,Fetch row from cursor,process fetched row,close cursor, deallocate cursor


You can also find related Interview Question to Database:List step to be performed to work with cursor?  below: 

Database:Define cursor?

  
It is a object that manipulate data in a set row by row. (More...)

Database: List different types of joins.

  
Inner join, Outer join, Self join (More...)

Database: List different types of outer joins.

  
Left outer join, right outer join, full outer join (More...)

Database Concurrency in Sql Server.

  
When two or more user try to update same type of data in a table then Database Concurrency helps in this situation.

There are 2 types of Database Concurrency

Pessimistic: When one user try to change the data with pessimistic concurrency then a lock is placed on the data in a table so that another user cannot change data. when one user finishes then other user can able to change.

Optimistic: When two user works on the same data in a table and one change that data first then second user cannot change that same data becasue the which he have using is allready changed so he cannot do the change becasue change apply to another data that is changed by first user. (More...)

How does CAS work?

  
The CAS security policy revolves around two key concepts - code groups and permissions. Each .NET assembly is a member of a particular code group, and each code group is granted the permissions specified in a named permission set.
For example, using the default security policy, a control downloaded from a web site belongs to the 'Zone - Internet' code group, which adheres to the permissions defined by the 'Internet' named permission set. (Naturally the 'Internet' named permission set represents a very restrictive range of permissions.) (More...)

List out the areas in which data structures are applied extensively?

  
1.Compiler Design,
2.Operating System,
3.Database Management System,
4.Statistical analysis package,
5.Numerical Analysis,
6.Graphics,
7.Artificial Intelligence,
8.Simulation (More...)

If you are using C language to implement the heterogeneous linked list, what pointer type will you use?

  
The heterogeneous linked list contains different data types in its nodes and we need a link, pointer to connect them. It is not possible to use ordinary pointers for this. So we go for void pointer. Void pointer is capable of storing pointer to any type as it is a generic pointer type. (More...)

What is a Database system?

  
The database and DBMS software together is called as Database system. (More...)

List the Coffman's conditions that lead to a deadlock.

  
1. Mutual Exclusion: Only one process may use a critical resource at a time.

2. Hold & Wait: A process may be allocated some resources while waiting for others.

3. No Pre-emption: No resource can be forcible removed from a process holding it.

4. Circular Wait: A closed chain of processes exist such that each process holds at least one resource needed by another process in the chain. (More...)

What is Cursor?

  
Cursor is a database object used by applications to manipulate data in a set on a row-by-row basis, instead of the typical SQL commands that operate on all the rows in the set at one time.
In order to work with a cursor we need to perform some steps in the following order:
. Declare cursor
. Open cursor
. Fetch row from the cursor
. Process fetched row
. Close cursor
. Deallocate cursor

Shashi Ray (More...)

Disadvantage of Cursor ?

  
Cursor plays there row quite nicely but although there are some disadvantage of Cursor .Because cursor doing roundtrip it will make network line busy and also make time consuming methods. First of all select query gernate output and after that cursor goes one by one so roundtrip happen.


Another disadvange of cursor are ther are too costly because they require lot of resources and temporary storage so network is quite busy. (More...)

What is a cursor?

  
A cursor is used to access the result set stored in the memory on execution of a query. It is a special programming construct that allows data to be manipulated on a row-by-row basis. They point to a certain location within a record set and allow the operator to move forward (and sometimes backward, depending upon the cursor type) through the results one record at a time (More...)

Quick Links For Interview Questions Categories:
ASP.Net Windows Application   .NET Framework   C#   VB.Net   ADO.Net  
Sql Server   SharePoint   Silverlight   OOPs   JQuery   JavaScript/VBScript
Biztalk Patten/Practices .IIS WCF WPF WWF
Networking Aptitude Others   All      

Find questions, FAQ's and their answers related to .NET, C#, Vb.Net, Sql Server and many more.

 
Now you can find lots of .NET, C#, Vb.Net, SQL Server,Windows, ASP.Net related Questions and their Answers here at www.dotnetspark.com. Our aim is to help you pass your certification Exams (MCP, MCSD, MCAD etc.,) with flying scores and get good name in your company.

So, Start looking our Interview Question section daily and improve your .NET Skills. You can also help others by posting Interview Questions and their Answers in this section.


Hall of Fame    Twitter   Terms of Service    Privacy Policy    Contact Us    Archives   Tell A Friend