Wednesday 26 September 2018

What is ArrayList in C#?

What is ArrayList in C#?

The ArrayList collection is similar to the Arrays data type in C#. The biggest difference is the dynamic nature of the array list collection.
For arrays, you need to define the number of elements that the array can hold at the time of array declaration. But in the case of the Array List collection, this does not need to be done beforehand. Elements can be added or removed from the Array List collection at any point in time. Let's look at the operations available for the array list collection in more detail.

Declaration of an Array List

The declaration of an ArrayList is provided below. An array list is created with the help of the ArrayList Datatype. The "new" keyword is used to create an object of an ArrayList. The object is then assigned to the variable a1. So now the variable a1 will be used to access the different elements of the array list.

ArrayList a1 = new ArrayList() 

Adding elements to an array

The add method is used to add an element to the ArrayList. The add method can be used to add any sort of data type element to the array list. So you can add an Integer, or a string, or even a Boolean value to the array list. The general syntax of the addition method is given below

ArrayList.add(element)


using System;
using System.Collections;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using System.Threading.Tasks;

namespace DemoApplication
{
 class Program
 {
  static void Main(string[] args)
  {
   ArrayList a1 = new ArrayList();
   a1.Add(1);
   a1.Add("Example");
   a1.Add(true);
   
   Console.WriteLine(a1.Count);
   Console.WriteLine(a1.Contains(2));
   Console.WriteLine(a1[1]);
   a1.RemoveAt(1);
   Console.WriteLine(a1[1]);
   Console.ReadKey();
  }
 }
}

Monday 24 September 2018

How Linux boots

As it turns out, there isn't much to the boot process:

   1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
   2. The kernel initializes the devices and its drivers.
   3. The kernel mounts the root filesystem.
   4. The kernel starts a program called init.
   5. init sets the rest of the processes in motion.
   6. The last processes that init starts as part of the boot sequence allow you to log in.

Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. To start, zero in on the boot loader, which is the initial screen or prompt you get after the computer does its power-on self-test, asking which operating system to run. After you make a choice, the boot loader runs the Linux kernel, handing control of the system to the kernel.

There is a detailed discussion of the kernel elsewhere in this book from which this article is excerpted. This article covers the kernel initialization stage, the stage when the kernel prints a bunch of messages about the hardware present on the system. The kernel starts init just after it displays a message proclaiming that the kernel has mounted the root filesystem:

VFS: Mounted root (ext2 filesystem) readonly.

Soon after, you will see a message about init starting, followed by system service startup messages, and finally you get a login prompt of some sort.

NOTE On Red Hat Linux, the init note is especially obvious, because it "welcomes" you to "Red Hat Linux." All messages thereafter show success or failure in brackets at the right-hand side of the screen.

Most of this chapter deals with init, because it is the part of the boot sequence where you have the most control.
init

There is nothing special about init. It is a program just like any other on the Linux system, and you'll find it in /sbin along with other system binaries. The main purpose of init is to start and stop other programs in a particular sequence. All you have to know is how this sequence works.

There are a few different variations, but most Linux distributions use the System V style discussed here. Some distributions use a simpler version that resembles the BSD init, but you are unlikely to encounter this.

Runlevels

At any given time on a Linux system, a certain base set of processes is running. This state of the machine is called its runlevel, and it is denoted with a number from 0 through 6. The system spends most of its time in a single runlevel. However, when you shut the machine down, init switches to a different runlevel in order to terminate the system services in an orderly fashion and to tell the kernel to stop. Yet another runlevel is for single-user mode, discussed later.

The easiest way to get a handle on runlevels is to examine the init configuration file, /etc/inittab. Look for a line like the following:

id:5:initdefault:

This line means that the default runlevel on the system is 5. All lines in the inittab file take this form, with four fields separated by colons occurring in the following order:
# A unique identifier (a short string, such as id in the preceding example)
# The applicable runlevel number(s)
# The action that init should take (in the preceding example, the action is to set the default runlevel to 5)
# A command to execute (optional)

There is no command to execute in the preceding initdefault example because a command doesn't make sense in the context of setting the default runlevel. Look a little further down in inittab, until you see a line like this:

l5:5:wait:/etc/rc.d/rc 5

This line triggers most of the system configuration and services through the rc*.d and init.d directories. You can see that init is set to execute a command called /etc/rc.d/rc 5 when in runlevel 5. The wait action tells when and how init runs the command: run rc 5 once when entering runlevel 5, and then wait for this command to finish before doing anything else.

There are several different actions in addition to initdefault and wait, especially pertaining to power management, and the inittab(5) manual page tells you all about them. The ones that you're most likely to encounter are explained in the following sections.

respawn

The respawn action causes init to run the command that follows, and if the command finishes executing, to run it again. You're likely to see something similar to this line in your inittab file:

1:2345:respawn:/sbin/mingetty tty1

The getty programs provide login prompts. The preceding line is for the first virtual console (/dev/tty1), the one you see when you press ALT-F1 or CONTROL-ALT-F1. The respawn action brings the login prompt back after you log out.

ctrlaltdel

The ctrlaltdel action controls what the system does when you press CONTROL-ALT-DELETE on a virtual console. On most systems, this is some sort of reboot command using the shutdown command.

sysinit

The sysinit action is the very first thing that init should run when it starts up, before entering any runlevels.

How processes in runlevels start

You are now ready to learn how init starts the system services, just before it lets you log in. Recall this inittab line from earlier:

l5:5:wait:/etc/rc.d/rc 5

This small line triggers many other programs. rc stands for run commands, and you will hear people refer to the commands as scripts, programs, or services. So, where are these commands, anyway?

For runlevel 5, in this example, the commands are probably either in /etc/rc.d/rc5.d or /etc/rc5.d. Runlevel 1 uses rc1.d, runlevel 2 uses rc2.d, and so on. You might find the following items in the rc5.d directory:

S10sysklogd       S20ppp          S99gpm
S12kerneld        S25netstd_nfs   S99httpd
S15netstd_init    S30netstd_misc  S99rmnologin
S18netbase        S45pcmcia       S99sshd
S20acct           S89atd
S20logoutd        S89cron

The rc 5 command starts programs in this runlevel directory by running the following commands:

S10sysklogd start
S12kerneld start
S15netstd_init start
S18netbase start
...
S99sshd start

Notice the start argument in each command. The S in a command name means that the command should run in start mode, and the number (00 through 99) determines where in the sequence rc starts the command.

The rc*.d commands are usually shell scripts that start programs in /sbin or /usr/sbin. Normally, you can figure out what one of the commands actually does by looking at the script with less or another pager program.

You can start one of these services by hand. For example, if you want to start the httpd Web server program manually, run S99httpd start. Similarly, if you ever need to kill one of the services when the machine is on, you can run the command in the rc*.d directory with the stop argument (S99httpd stop, for instance).

Some rc*.d directories contain commands that start with K (for "kill," or stop mode). In this case, rc runs the command with the stop argument instead of start. You are most likely to encounter K commands in runlevels that shut the system down.

Adding and removing services

If you want to add, delete, or modify services in the rc*.d directories, you need to take a closer look at the files inside. A long listing reveals a structure like this:

lrwxrwxrwx . . . S10sysklogd -> ../init.d/sysklogd
lrwxrwxrwx . . . S12kerneld -> ../init.d/kerneld
lrwxrwxrwx . . . S15netstd_init -> ../init.d/netstd_init
lrwxrwxrwx . . . S18netbase -> ../init.d/netbase
...

The commands in an rc*.d directory are actually symbolic links to files in an init.d directory, usually in /etc or /etc/rc.d. Linux distributions contain these links so that they can use the same startup scripts for all runlevels. This convention is by no means a requirement, but it often makes organization a little easier.

To prevent one of the commands in the init.d directory from running in a particular runlevel, you might think of removing the symbolic link in the appropriate rc*.d directory. This does work, but if you make a mistake and ever need to put the link back in place, you might have trouble remembering the exact name of the link. Therefore, you shouldn't remove links in the rc*.d directories, but rather, add an underscore (_) to the beginning of the link name like this:

mv S99httpd _S99httpd

At boot time, rc ignores _S99httpd because it doesn't start with S or K. Furthermore, the original name is still obvious, and you have quick access to the command if you're in a pinch and need to start it by hand.

To add a service, you must create a script like the others in the init.d directory and then make a symbolic link in the correct rc*.d directory. The easiest way to write a script is to examine the scripts already in init.d, make a copy of one that you understand, and modify the copy.

When adding a service, make sure that you choose an appropriate place in the boot sequence to start the service. If the service starts too soon, it may not work, due to a dependency on some other service. For non-essential services, most systems administrators prefer numbers in the 90s, after most of the services that came with the system.

Linux distributions usually come with a command to enable and disable services in the rc*.d directories. For example, in Debian, the command is update-rc.d, and in Red Hat Linux, the command is chkconfig. Graphical user interfaces are also available. Using these programs helps keep the startup directories consistent and helps with upgrades.

HINT: One of the most common Linux installation problems is an improperly configured XFree86 server that flicks on and off, making the system unusable on console. To stop this behavior, boot into single-user mode and alter your runlevel or runlevel services. Look for something containing xdm, gdm, or kdm in your rc*.d directories, or your /etc/inittab.

Controlling init

Occasionally, you need to give init a little kick to tell it to switch runlevels, to re-read the inittab file, or just to shut down the system. Because init is always the first process on a system, its process ID is always 1.

You can control init with telinit. For example, if you want to switch to runlevel 3, use this command:

telinit 3

When switching runlevels, init tries to kill off any processes that aren't in the inittab file for the new runlevel. Therefore, you should be careful about changing runlevels.

When you need to add or remove respawning jobs or make any other change to the inittab file, you must tell init about the change and cause it to re-read the file. Some people use kill -HUP 1 to tell init to do this. This traditional method works on most versions of Unix, as long as you type it correctly. However, you can also run this telinit command:

telinit q

You can also use telinit s to switch to single-user mode.

Shutting down

init also controls how the system shuts down and reboots. The proper way to shut down a Linux machine is to use the shutdown command.

There are two basic ways to use shutdown. If you halt the system, it shuts the machine down and keeps it down. To make the machine halt immediately, use this command:

shutdown -h now

On most modern machines with reasonably recent versions of Linux, a halt cuts the power to the machine. You can also reboot the machine. For a reboot, use -r instead of -h.

The shutdown process takes several seconds. You should never reset or power off a machine during this stage.

In the preceding example, now is the time to shut down. This argument is mandatory, but there are many ways of specifying it. If you want the machine to go down sometime in the future, one way is to use +n, where n is the number of minutes shutdown should wait before doing its work. For other options, look at the shutdown(8) manual page.

To make the system reboot in 10 minutes, run this command:

shutdown -r +10

On Linux, shutdown notifies anyone logged on that the machine is going down, but it does little real work. If you specify a time other than now, shutdown creates a file called /etc/nologin. When this file is present, the system prohibits logins by anyone except the superuser.

When system shutdown time finally arrives, shutdown tells init to switch to runlevel 0 for a halt and runlevel 6 for a reboot. When init enters runlevel 0 or 6, all of the following takes place, which you can verify by looking at the scripts inside rc0.d and rc6.d:

   1. init kills every process that it can (as it would when switching to any other runlevel).

# The initial rc0.d/rc6.d commands run, locking system files into place and making other preparations for shutdown.
# The next rc0.d/rc6.d commands unmount all filesystems other than the root.
# Further rc0.d/rc6.d commands remount the root filesystem read-only.
# Still more rc0.d/rc6.d commands write all buffered data out to the filesystem with the sync program.
# The final rc0.d/rc6.d commands tell the kernel to reboot or stop with the reboot, halt, or poweroff program.

The reboot and halt programs behave differently for each runlevel, potentially causing confusion. By default, these programs call shutdown with the -r or -h options, but if the system is already at the halt or reboot runlevel, the programs tell the kernel to shut itself off immediately. If you really want to shut your machine down in a hurry (disregarding any possible damage from a disorderly shutdown), use the -f option. 

Sunday 23 September 2018

What is .NET Framework?

What is Microsoft .Net Framework?

The .Net framework is a software development platform developed by Microsoft. The framework was meant to create applications, which would run on the Windows Platform. The first version of the .Net framework was released in the year 2002.
The version was called .Net framework 1.0. The .Net framework has come a long way since then, and the current version is 4.7.1.
The .Net framework can be used to create both - Form-based and Web-based applications. Web services can also be developed using the .Net framework.

The framework also supports various programming languages such as Visual Basic and C#. So developers can choose and select the language to develop the required application. In this chapter, you will learn some basics of the .Net framework.

.Net Framework Architecture

The basic architecture of the .Net framework is as shown below.

What is .NET Framework

NET Components

The architecture of the .Net framework is based on the following key components;

1. Common Language Runtime

The "Common Language Infrastructure" or CLI is a platform on which the .Net programs are executed.
The CLI has the following key features:
  • Exception Handling - Exceptions are errors which occur when the application is executed. Examples of exceptions are:
    • If an application tries to open a file on the local machine, but the file is not present.
    • If the application tries to fetch some records from a database, but the connection to the database is not valid.
  • Garbage Collection - Garbage collection is the process of removing unwanted resources when they are no longer required. Examples of garbage collection are
    • A File handle which is no longer required. If the application has finished all operations on a file, then the file handle may no longer be required.
    • The database connection is no longer required. If the application has finished all operations on a database, then the database connection may no longer be required.
  • Working with Various programming languages –
As noted in an earlier section, a developer can develop an application in a variety of .Net programming languages.
  1. Language - The first level is the programming language itself, the most common ones are VB.Net and C#.
  2. Compiler – There is a compiler which will be separate for each programming language. So underlying the VB.Net language, there will be a separate VB.Net compiler. Similarly, for C#, you will have another compiler.
  3. Common Language Interpreter – This is the final layer in .Net which would be used to run a .net program developed in any programming language. So the subsequent compiler will send the program to the CLI layer to run the .Net application.

What is .NET Framework

2. Class Library

The .NET Framework includes a set of standard class libraries. A class library is a collection of methods and functions that can be used for the core purpose.
For example, there is a class library with methods to handle all file-level operations. So there is a method which can be used to read the text from a file. Similarly, there is a method to write text to a file.
Most of the methods are split into either the System.* or Microsoft.* namespaces. (The asterisk * just means a reference to all of the methods that fall under the System or Microsoft namespace)
A namespace is a logical separation of methods. We will learn these namespaces more in detail in the subsequent chapters.

3. Languages

The types of applications that can be built in the .Net framework is classified broadly into the following categories.
  • WinForms – This is used for developing Forms-based applications, which would run on an end user machine. Notepad is an example of a client-based application.
  • ASP.Net – This is used for developing web-based applications, which are made to run on any browser such as Internet Explorer, Chrome or Firefox.
    • The Web application would be processed on a server, which would have Internet Information Services Installed.
    • Internet Information Services or IIS is a Microsoft component which is used to execute an Asp.Net application.
    • The result of the execution is then sent to the client machines, and the output is shown in the browser.
  • ADO.Net – This technology is used to develop applications to interact with Databases such as Oracle or Microsoft SQL Server.

Microsoft always ensures that .Net frameworks are in compliance with all the supported Windows operating systems.

Wednesday 19 September 2018

 C# Interview Questions with Answers

Q -1) What is an Object and a Class?

Ans: A Class is an encapsulation of properties and methods that are used to represent a real-time                  entity. It is a data structure that brings all the instances together in a single unit.

Q -2) What are the fundamental OOP concepts?
Ans: The four fundamental concepts of Object Oriented Programming are:
  • Encapsulation – The Internal representation of an object is hidden from the view outside object’s definition. Only the required information can be accessed whereas the rest of the data implementation is hidden.
  • Abstraction – It is a process of identifying the critical behavior and data of an object and eliminating the irrelevant details.
  • Inheritance – It is the ability to create new classes from another class. It is done by accessing, modifying and extending the behavior of objects in the parent class.
  • Polymorphism – The name means, one name, many forms. It is achieved by having multiple methods with the same name but different implementations.
Q -3) What is Managed and Unmanaged code?

Ans: Managed code is a code which is executed by CLR (Common Language Runtime) i.e all application code based on .Net Platform. It is considered as managed because of the .Net framework which internally uses the garbage collector to clear up the unused memory.

Unmanaged code is any code that is executed by application runtime of any other framework apart from .Net. The application runtime will take care of memory, security and other performance operations.

Q -4) What are the different types of classes in C#?
Ans: The different types of class in C# are:

  • Partial class – Allows its members to be divided or shared with multiple .cs files. It is denoted by the keyword Partial.
  • Sealed class – It is a class which cannot be inherited. To access the members of a sealed class, we need to create the object of the class.  It is denoted by the keyword Sealed.
  • Abstract class – It is a class whose object cannot be instantiated. The class can only be inherited. It should contain at least one method.  It is denoted by the keyword abstract.
  • Static class – It is a class which does not allow inheritance. The members of the class are also static.  It is denoted by the keyword static. This keyword tells the compiler to check for any accidental instances of the static class.
Q -5) Explain Code compilation in C#.
Ans: There are four steps in code compilation which include:

  • Compiling the source code into Managed code by C# compiler.
  • Combining the newly created code into assemblies.
  • Loading the Common Language Runtime(CLR).
  • Executing the assembly by CLR.
Q -6) What is the difference between Virtual method and Abstract method?
Ans: Virtual method must always have a default implementation. However, it can be overridden in the derived class, though not mandatory. It can be overridden using override keyword.
An Abstract method does not have an implementation. It resides in the abstract class. It is mandatory that the derived class implements the abstract method. An override keyword is not necessary here though it can be used.

Q -7) Explain Namespaces in C#.
Ans: They are used to organize large code projects. “System” is the most widely used namespace in C#. We can create our own namespace and use one namespace in another, which are called Nested Namespaces.
They are denoted by the keyword “namespace”.

Tuesday 18 September 2018

Aspire 3620/TravelMate 2420 Series Service Guide

Power-On Self-Test (POST) Error Message The POST error message index lists the error message and their possible causes. The most likely cause is listed first.

 NOTE: Perform the FRU replacement or actions in the sequence shown in FRU/Action column, if the FRU replacement does not solve the problem, put the original part back in the computer. Do not replace a non-defective FRU. This index can also help you determine the next possible FRU to be replaced when servicing a computer. If the symptom is not listed, see “Undetermined Problems” . The following lists the error messages that the BIOS displays on the screen and the error symptoms classified by function.

 NOTE: Most of the error messages occur during POST. Some of them display information about a hardware device, e.g., the amount of memory installed. Others may indicate a problem with a device, such as the way it has been configured. 

NOTE: If the system fails after you make changes in the BIOS Setup Utility menus, reset the computer, enter Setup and install Setup defaults or correct the error. 




                                                    Index of Error Messages 

             Error Codes
                                     Error Messages
 006
    Equipment Configuration Error Causes: 
1. CPU BIOS Update Code Mismatch 
2. IDE Primary Channel Master Drive Error (THe causes will be shown before “Equipment Configuration Error”)
 071
              CMOS Battery Bad
  no error code
  Battery critical LOW In this situation BIOS will issue 4 short beeps then shut down system, no message will show.
 no  error code
 Thermal critical High In this situation BIOS will shut down system, not show message.











                                  Error Message List


         Error Messages
                       FRU/Action in Sequence
 Failure Fixed Disk
 Reconnect hard disk drive connector. 
“Load Default Settings” in BIOS Setup Utility.
 Hard disk drive 
System board
 Shadow RAM Failed at offset: nnnn
 BIOS ROM 
System board
 System RAM Failed at offset: nnnn
 DIMM
 System board
 System timer error
 RTC battery Run BIOS Setup Utility to reconfigure system time, then reboot system. 
System board
No beep, power-on indicator turns on and LCD is blank.
Power source (battery pack and power adapter). See “Power System..
 Reconnect the LCD connector
 Hard disk drive
 LCD inverter ID
LCD cable LCD Inverter
LCD
 System board













Friday 14 September 2018

How to Hide Any Drive in Windows Using Command Prompt

Step 1:
Press “Windows + R” and type “cmd”, next type “DISKPART”. Now you see a new Dialog box open with command prompt.
Step 2:
Type “LIST VOLUME”in the command prompt and press enter. (Now you see your all window drives or volumes with name or numbers.)
Step 3:
Now remember the volume letter or number you want to hide and type “SELECT VOLUME number or letter”(See the below screenshot). Here I select Volume 1 for example, you can select your volume.
Step 4:
Next type “REMOVE LETTER D”(Type the drive letter you want to hide, here I wrote D just for an example.)

Now go to MY Computer and check whether the drive is hidden or not. It should be hidden if you’ve done everything as above.
Step 5:

To unhide the drive again, just type “ASSIGN LETTER letter of Drive” (See the Screenshot).
That’s it now the drive or partition you have hidden before will appear now.
With this trick, you can hide your computer drives and also change the letter of any hard drives. I hope you like this trick and share this trick with your friends.

What is Ransomware and Best Way to Protect from Ransomware

What is Ransomware ?

Ransomware is a virus program used to take control over the victim's computer system or to lock the victim's computer.
Before ransomware attack, you have full control over your computer system.
After ransomware attack, you can't have any further control over your computer system.

Why Ransomware ?

Ransomware means virus asking for money. Or virus made just to take some money from the victim after performing some dangerous actions so that victim becomes able to pay those asked amount of money from that virus.

Biggest Virus Attack in Internet History

The WannaCry ransomware virus attack is the biggest virus attack in the Internethistory.

What Ransomware Virus Attack can do ?

Ransomware virus attack locks your computer, that is, after the attack of ransomware virus, you can not further operate your computer system or you would not be able to open your files or any other important documents that is stored on your computer system.
You can open all your normal to secret and private files before wannacry ransomware virus attack.

linux

Creating a folder in Microsoft Windows

My Computer or Windows Explorer
  1. Open My Computer or Windows Explorer
  2. Open the drive or folder in which you'd like to create the new folder; for example, the C: drive. If you do not want to create a folder in the root directory, browse to the location of your choosing.
  3. In Windows 10 on the Home tab, click the New folder icon. In Windows 7 and earlier on the file menu bar, select File and then Folder

Thursday 13 September 2018

Turn off Windows Explorer’s “Quick Access” view

While Quick Access is great for finding a recently or commonly used file or folder, those who just want to find something quickly on their computer might prefer the “This PC” view from Windows 7 and Windows 8. Thankfully, you can switch Explorer to this arrangement in just a couple of simple steps.
  1. 1-Open File Explorer
  2. 2-Click View then Options on the far right. The “Folder Options” menu will  appear
  3. 3-Next to the “Open File Explorer to” option, select “This PC” from the     dropdown menu
  4. 4-Click Apply then OK to confirm the change

Tuesday 11 September 2018

The Best New Features of Windows 10

The Start Menu is Back, Baby

Windows 8 made the hugely controversial move to eliminate the Start Menu, opting instead for a don’t-call-it-Metro style Start Screen. It went over about as well as you’d expect. In Windows 10, however, the Start Menu is back. Now, Live Tiles live here just like regular app icons, in (relatively) perfect harmony.
The folder-based organization has been left behind in favor of a favorites- and search-based organization. You can start typing as soon as you open the Start menu to find an app and launch it by name. If you’d rather not type the name of an app every time, you can pin it to the Start Menu where it will live alongside your other tiles. Your most used shortcuts will also appear in their own list. You can click “All Apps” to see a list of everything that’s in your Start Menu, though it will show up as an alphabetical list that may be hard to sift through if you’re used to folders.

Cortana Makes the Start Menu Even Smarter

As if bringing the Start Menu back weren’t enough, Microsoft has built its personal voice assistant Cortana right in. Even if you’re already using Google Now or Siri, having Cortana on your desktop can be handy. You can perform web searches to get many of the same quick answers by simply pressing the Win key and typing a question like “How many ounces are in a cup” or “What’s the weather like?”
Cortana’s more than just voice commands, though. If you sign in with your Microsoft account, you can use Cortana to set reminders, add calendar events, and it can even give you Google Now-style cards with relevant information like stock quotes or news stories. Of course, many of these features only work at their best if you’re using Microsoft services—or at least syncing your services like Google Calendar to a Microsoft app—but even if you don’t want to get into Microsoft’s ecosystem, it’s still far more powerful than the Start Menu of the past.

You Can Now Add Multiple Desktops

Being able to run a few apps at once is the great benefit of an operating system like Windows. Running too many, though, can get overwhelming. Now, Microsoft is finally adding the ability to create and manage multiple desktops. You can add new desktops, quickly move windows between them, and jump between desktops by pressing Win-Tab. This may not be all that useful for average users, but those of us who do a lot of work with our machines will appreciate the feature.

Sunday 9 September 2018

Installing the SQL Anywhere ASP.NET Providers

                                 Installing the SQL Anywhere ASP.NET Providers 

The SQL Anywhere ASP.NET providers allow you to build a security mechanism using a SQL Anywhere database as backend storage. They must be installed in order to add the required schema to a designated database for storing and managing confidential user information. SQL Anywhere includes five providers: • Membership Provider: provides authentication and authorization services. • Roles Provider: provides methods for creating roles, adding users to roles, and deleting roles. Use the roles provider to assign users to groups and manage permissions. • Profiles Provider: provides methods for reading, storing, and retrieving user information such as user preferences. • Web Parts Personalization Provider: provides methods for loading and storing the personalized content and layout of web pages. • Health Monitoring Provider: provides methods for monitoring the status of deployed web applications. Please refer to the online documentation for more information about SQL Anywhere ASP.NET Providers: http://dcx.sybase.com/1101en/dbprogramming_en11/aspdotnet-providers.html. SQL Anywhere also provides a setup wizard to help you add the required security schema to the database. You can either add the SQL Anywhere ASP.NET providers to a new database or to an existing database. For simplicity, we will use the SQL Anywhere demo database (http://dcx.sybase.com/1101en/saintro_en11/sademo-s-3865920.html) in the following procedures.

Saturday 8 September 2018

.NET


माइक्रोसॉफ्ट .NET फ्रेमवर्क (Microsoft .NET Framework) एक सॉफ्टवेयर संरचना है जो माइक्रोसॉफ्ट विन्डोज़ (Microsoft Windows) ऑपरेटिंग सिस्टम पर चल रहे कंप्यूटर पर स्थापित किये जा सकते हैं. इसमें सामान्य प्रोग्रामिंग समस्याओं के निष्पादन के लिए कोडित समाधान का एक बड़ा पुस्तकालय भी शामिल है और एक आभासी मशीनहै जो विशेष रूप से ढांचे के लिए लिखे गए प्रोग्राम के क्रियान्वयन का प्रबंधन करती है. .NET फ्रेमवर्क (.NET Framework) माइक्रोसॉफ्ट (Microsoft) की एक पेशकश है और विन्डोज़ (Windows) प्लेटफॉर्म के लिए बनाये गए अधिकांश नए अनुप्रयोगों द्वारा इस्तेमाल करने के लिए बनाया गया है.
फ्रेमवर्क की बेस कक्षा लाइब्रेरी सुविधाओं की एक बड़ी सीमा प्रदान करता है जिसमें उपयोगकर्ता इंटरफ़ेस, डेटा का उपयोग, डेटाबेस कनेक्टिविटी, क्रिप्टोग्राफी, वेब अनुप्रयोग विकास, आंकिक एल्गोरिथ्म और नेटवर्क संचार शामिल हैं. वर्ग पुस्तकालय उन प्रोग्रामर द्वारा प्रयोग किया जाता है, जो आवेदन उत्पन्न करने के लिए इसे अपने स्वयं के कोड के साथ सम्मिलित करते हैं.
.NET फ्रेमवर्क (.NET Framework) के लिए प्रोग्राम लिखने के लिए एक सॉफ्टवेयर पर्यावरण को कार्यशील किया जाता है जो प्रोग्राम चलाने के लिए आवश्यकताओं का प्रबंधन करता है. .NET फ्रेमवर्क (.NET Framework) का भी हिस्सा, इस क्रम पर्यावरण को साझा भाषा क्रम (सी एल आर (CLR)) के रूप में जाना जाता है. सी एल आर (CLR) एक आवेदन आभासी मशीन प्रदान करता है ताकि प्रोग्रामर को कार्यक्रम क्रियान्वित करने के लिए विशिष्ट सी पी यू (CPU) की क्षमताओं की जरूरत नहीं पड़े. ऐसी सुरक्षा के लिए सी एल आर (CLR) भी अन्य महत्वपूर्ण सेवाएं प्रदान करता है, जैसे -स्मृति प्रबंधन और अपवाद हैंडलिंग. श्रेणी के पुस्तकालय और सी एल आर (CLR) साथ-साथ NET Framework का गठन करते हैं.
.NET फ्रेमवर्क (.NET Framework) के संस्करण-3 में विन्डोज़ सर्वर (Windows Server)2008, विन्डोज़ विस्ता (Windows Vista), और विन्डोज़-7 (Windows-7) शामिल हैं. फ्रेमवर्क का वर्तमान स्थिर संस्करण जो 3.5 है, उसे विन्डोज़ एक्स पी (Windows XP) और विन्डोज़ सर्वर (Windows Server) 2003 ऑपरेटिंग सिस्टम के परिवार पर भी स्थापित किया जा सकता है.[2] फ्रेमवर्क के संस्करण 4 को 20 मई, 2009 को एक सार्वजनिक बीटा के रूप में जारी किया गया था.
.NET फ्रेमवर्क (.NET Framework) परिवार में मोबाइल या एम्बेडेड उपकरण के इस्तेमाल के लिए दो संस्करण भी शामिल है. फ्रेमवर्क का एक छोटा संस्करण,.NET कम्पैक्ट फ्रेमवर्क, विन्डोज़ सीई (Windows CE) प्लेटफार्म पर उपलब्ध है और इसमें स्मार्टफोन के रूप में विन्डोज़ (Windows) मोबाइल उपकरण शामिल हैं. इसके अतिरिक्त, .NET सूक्ष्म फ्रेमवर्क गंभीर रूप से सीमित संसाधन उपकरणों पर लक्षित है.

What is ArrayList in C#?

What is ArrayList in C#? The ArrayList collection is similar to the Arrays data type in C#. The biggest difference is the dynamic natur...