VB Net Questions Answers 2
VB Net Questions Answers 2
com/
Metadata is termed as “Data about content of the data” and it is found in the catalog of
libraries. Practically, it is used at back side of book to see the necessary topic.
VB VB.Net
Platform dependent Platform Independent
VB is backward compatible VB.Net is not backward compatible
Interpreted Compiler Language
Exception Handling by ‘On Error…..Goto’ Exception Handling by ‘Try….Catch’
Cannot develop multi-threaded applications Can develop multi thread applications
VB.Net C#
Optional Parameters are accepted Optional Parameters are not accepted
Not case sensitive Case Sensitive
Nothing is used to release unmanaged ‘Using’ is used to release unmanaged
resources resources
Support of Both structured and unstructured Unstructured error handling
1/8
https://career.guru99.com/
error handling
4. What is namespace?
System.Data namespace is used for accessing and managing data from the required data
source. This namespace deals only with the data from the specified database.
6. What is JIT?
JIT is termed as Just in Time compiler which is used as a part of runtime execution
environment. There are three types of JIT and they are:
An assembly is one of the elements of a .NET application and it termed as a primary unit of
all .NET applications. This assembly can be either DLL or executable file.
Strong Name is an important feature of .Net and it is used to identify shared assembly uniquely.
2/8
https://career.guru99.com/
Strong name has solved the problem of creating different object with same name and it can be
assigned with the help of Sn.exe.
Assembly is physical grouping of all units and Namespace logically groups classes. Namespace
can have multiple assemblies.
INTERNAL keyword is one of the access specifier which will be visible in a given assembly i.e.
in a DLL file. This forms a single binary component and it is visible throughout the assembly.
.Net generally allows implicit conversion of any data types. In order to avoid data loss during
data type conversion, Option Strict keyword is used and it ensures compile time notification of
these types of conversions.
Option Explicit is the keyword used in a file to explicitly declare all variables using declare
keywords like Dim, Private, Public or Protected. If undeclared variable name persists, an error
occurs at compile time.
New keyword is used with the constructor in which it can be used as a modifier or an operator.
When it is used as a modifier, it hides inherited member from the base class member. When it is
used as an operator, it creates an object to invoke constructors.
[crayon-5f2d2174e6df7691161578/]
14. What is ReDim keyword and its use?
Redim keyword is exclusively used for arrays and it is used to change the size of one or more
dimensions of an array that has been already declared. Redim can free up or add elements to
an array whenever required.
[crayon-5f2d2174e6dfc825390235/]
15. What is jagged array in VB.Net?
3/8
https://career.guru99.com/
Jagged array is nothing but an array of arrays. Each entry in the array is another array
that can hold any number of items.
A Manifest is a text file that is used to store metadata information of .NET assemblies. File type
of Manifest can be saved as a type PE. Assembly Name, Version, Culture and key token can be
saved as a Manifest.
17. What are all the differences between Dispose and Finalize()?
Finalize method is called by Garbage collector which helps us to make free of unmanaged
resources. There are some other resources like window handles, database connections are
handled by iDisposable interface.
Garbage collection is also known as automatic memory management, which is used for
automatic recycling of dynamically allocated memory. Garbage collection is performed by
Garbage collector which will recycle memory if it is proven that memory will be unused.
Generation 0 – This identifies a newly created object that has been never marked for collection.
Generation 1 – This identifies an object which has been marked as collection but not removed.
Generation 2 – This identifies an object that has survived more than one sweep of the Garbage
collector.
Variable must be compulsorily declared when the Option Explicit is termed as ON. If it is OFF,
variables can be used without declaration.
System.string class is non-updatable and it will create new string object instead of updating the
same. But updation in the same string object is possible for String. Stringbuilder class. So, the
operation on string builder is faster and efficient than the string class.
4/8
https://career.guru99.com/
Int32 represent 32-bit signed integer whereas int is not a keyword used in VB.Net.
Hashtable is set to be items with key and value pairs. Keys are referred as indexes and quick
search can be performed for values by searching through the keys.
A class that can be declared within the scope of another class. These classes are considered
within the scope of the enclosed class and are available within that class or scope.
An Enumerator or Enum is a value type with a set of constants given to the set of the list.
Enumeration is used when definition is required for more than one number.
A delegate is defined as an object that can refer to a method. Whenever a delegate is assigned
to a method, it behaves exactly like that method.
Example:
[crayon-5f2d2174e6dff711056025/]
27. What is Globalization?
Globalization is nothing but making the application Internationalize and localizing the
application to other languages or cultures. Culture is nothing but a combination of
Language(English) and the location like US or UK.
DataReader Dataset
Datareader has read only access to the data Dataset can hold more than one table from the
and it is set to be forward only. same data source. It even stores relationships
between tables.
Datareader cannot persist contents as it is read Dataset can persist contents
only
Datareader is connected architecture Dataset is disconnected architecture
5/8
https://career.guru99.com/
Value types directly store the data and it is allocated to stack. Reference type store a reference
to the value’s memory address and are allocated to heap.
TRACE allows the user to view how the code has been executed in detail. This tells how the
code is working.
Authentication is the process of obtaining credentials from the users and verifying the user’s
identity. Authorization is the process of giving access to the authenticated resources.
Authentication leads to Authorization.
Windows Authentication
Forms Authentication
Passport Authentication
GAC is used where shared .NET assembly resides. It is used in the following criteria:
CLR is abbreviated as Common Language Runtime and it forms heart of the .NET
framework. It is the responsibility of runtime to take care of the code execution of the program.
CLR takes care of the following:
Garbage Collection
Code Verification
Code Access Security
IL (Intermediate Language)
CTS is Common Type System which is used to communicate smoothly between the languages.
For example, if VB has Integer data type and C++ has long data type and these data types are
6/8
https://career.guru99.com/
not compatible.
Common Language Specification is a subset of CTS and it is used to unite all languages in to
one umbrella. This extends to support all the .NET language into one unit.
Managed Code is used to run inside the CLR environment and it is called as .NET run time. All
Intermediate Language (IL) are set to be Managed code.
C#
VB.Net
COBOL
Perl
They are – Common Language Runtime (CLR) and .NET Framework class library.
Thread is used to execute more than one program at a time. Whereas, Process executes single
program at a time.
Strong type is checking the types of variables at compile time and weak type is checking the
types of system as late as possible which is nothing but run time.
7/8
https://career.guru99.com/
44. How many .NET languages can a single .NET DLL contain?
45. What is the class that allows an element to be accessed using Unique key?
Hash table is the collection class that allows an element to be accessed using Unique key.
.NET framework provides security features to secure code from unauthorized users. There are
two types of security in .NET:
Deep copy is nothing but creating a new object and then copying the non-static fields of the
current object to new object.
8/8
Powered by TCPDF (www.tcpdf.org)