What does operator order of precedence mean? 

1 Answer

Answer :

Certain operators are evaluated before others. Brackets help to avoid confusion. 

Related questions

Description : Refer the points as listed below: (a) What are the operator precedence rules ? (b) What are the operator associativity rules ? (c) What is the order of operand evaluation ? (d) Are there restrictions on operand evaluation side effects ? ... (d) (C) (a), (b) and (d) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d)

Description : Write some code to overload an operator. 

Last Answer : class TempleCompare { public int templeCompareID; public int templeValue; public static bool operator == (TempleCompare x, TempleCompare y) { return (x.templeValue == y.templeValue); } ... templeValue); } public override int GetHashCode() { return templeCompareID; } }

Description : Describe an operator from each of these categories:

Last Answer : Arithmetic: + Logical (boolean and bitwise): & String concatenation: + Increment, decrement: ++ Shift: >> Relational: == Assignment: = Member access: . Indexing: [] Cast: () ... : + Object creation: new Type information: as Overflow exception control: checked Indirection and Address: *

Description : Can operator parameters be reference parameters?

Last Answer : No

Description : An operator declaration must include a public and static modifier, can it have other modifiers?

Last Answer : No

Description : What doe the stackalloc operator do?

Last Answer : Allocate a block of memory on the stack (used in unsafe mode).  

Description : What is the difference between the new operator and modifier?

Last Answer : The new operator creates an instance of a class whereas the new modifier is used to declare a method with the same name as a method in one of the parent classes.

Description : the order of precedence determines -General Knowledge

Last Answer : The order of precedence determines the order in which calculations are performed.

Description : Write the order of precedence for validation of a column in a table ?

Last Answer : I. done using Database triggers. ii. done using Integarity Constraints.?

Description : Describe two ways to set the tab order of controls on your form.

Last Answer : You can set the tab order in Visual Studio by choosing Tab Index from the View menu and clicking each control in the order you desire. Alternatively, you can set the TabIndex property either in code or in the Properties window.

Description : How can you sort the elements of the array in descending order?

Last Answer : By calling Sort() and then Reverse() methods. 

Description : How can you sort the elements of the array in descending order? 

Last Answer : By calling Sort() and then Reverse() methods.

Description : What are the three possible settings for the CommandType property of a SqlCommand object or an OleDbCommand object, and what does each mean?

Last Answer : A Command object can have a CommandType property setting of Text, StoredProcedure, or TableDirect. When set to Text, the command executes the SQL string that is stored in the Command object's ... that the command should return the entire contents of the table indicated by the CommandText property. 

Description : What do u mean by Satellite Assemblies ?

Last Answer : Answer: The assemblies which contains only culture information are known as satellite assemblies.This assembly is used to get language specific resources for an application .

Description : What does the term immutable mean?

Last Answer : The data value may not be changed. Note: The variable value may be changed, but the original immutable data value was discarded and a new data value was created in memory.

Description : What does marshalling mean?

Last Answer : The process of packing one or more items of data into a message buffer, prior to transmitting that message buffer over a communication channel. The packing process not only collects together ... data of different types into a standard representation agreed with the recipient of the message.  

Description : Given part of a stack trace: aspnet.debugging.BadForm.Page_Load(Object sender, EventArgs e) +34. What does the +34 mean?

Last Answer : It is an actual offset (at the assembly language level) – not an offset into the IL instructions. 

Description : Is constructor or destructor inheritance explicit or implicit? What does this mean?

Last Answer : Constructor or destructor inheritance is explicit…. Public Extended : base() this is called the constructor initializer.

Description : Strings are immutable, what does this mean?

Last Answer : Any changes to that string are in fact copies. 

Description : What does the term immutable mean?

Last Answer : The data value may not be changed. Note: The variable value may be changed, but the original immutable data value was discarded and a new data value was created in memory. 

Description : What does the keyword virtual mean in the method definition? 

Last Answer : The method can be over-ridden. 

Description : Do you believe parents should take precedence over their children?

Last Answer : You don’t have kids, do you? All the logic and reason you argue really doesn’t happen much in messy, emotionally fraught, real life.

Description : Which amendments accorded precedence to Directive Principle over Fundamental Rights? -General Knowledge

Last Answer : The answer is '42nd Amendment'

Description : Which amendments accorded precedence to Directive Principle over Fundamental Rights? -Do You Know?

Last Answer : answer:

Description : Which amendments accorded precedence to Directive Principle over Fundamental Rights? -General Knowledge

Last Answer : answer:

Description : Which amendments accorded precedence to Directive Principle over Fundamental Rights? -General Knowledge

Last Answer : answer:

Description : What is the correct order in the situation shown in the image below? [img alt_text = 'when the tram has priority' description = ''] https:///wp-content/uploads/2017/03/villamod.png [/ img]

Last Answer : The correct passing order is ABC. The "A" vehicle is traveling straight, so you cannot turn ahead of the "C" vehicle due to the electric or right-hand rule. Since the vehicle marked "C" would cross its tram route with a change of direction, it should give priority to the tram.     

Description : In the warrant of precedence, the Speaker of the Lok Sabha comes next only to (1) The President (2) The Vice-President (3) The Prime Minister (4) The Cabinet Ministers

Last Answer : (3) The Prime Minister Explanation: The Speaker is looked upon as the true guardian of the traditions of parliamentary democracy. Her unique position is illustrated by the fact that she is placed very high in the Warrant of Precedence in our country, standing next only to the Prime Minister.

Description : Which Constitutional Amendment gave precedence to the Directive Principles of State Policy over Fundamental Rights? (1) 42nd (2) 44th (3) 52nd (4) 56th

Last Answer : (1) 42nd Explanation: The Forty-second Amendment of the Constitution of India, enacted in 1976, attempted to reduce the power of the Indian Supreme Court and High Courts to ... of administrative tribunals for service matters of Government employees and also other tribunals for economic offences.

Description : Which amendments accorded precedence to Directive Principle over Fundamental Rights?

Last Answer : 42nd Amendment

Description : Which amendments accorded precedence to Directive Principle over Fundamental Rights?

Last Answer : 42nd Amendment

Description :  During a new project planning process to sequence activities, the project  manager, Nate, decides to use the precedence diagraming method to show the  identified activity dependencies. Which of the following logical ... -finish c. Finish-to-finish d. Start-to-start e. All of these answers

Last Answer : b. Start-to-finish

Description : Which among the below stated datagram discard code fields in ICMP is/are generated if a router fails to forward a packet due to administrative filtering? a. Source Route Failed b. Communication Administratively Prohibited c. Host Precedence Violation d. Precedence Cut-off in Effect

Last Answer : b. Communication Administratively Prohibited

Description : dummy activity is used in PERT network to describe the (A) Precedence relationship (B) Resource idleness (C) Resource restriction (D) Necessary time delay

Last Answer : Option A

Description : In a PERT network, the earliest(activity) start time is the a. Earliest time that an activity can be finished without delaying the entire project b. Latest time that an activity can ... of precedence requirements d. Latest time that an activity can be finished without delaying the entire project

Last Answer : c. Earliest time that an activity can be started without violation of precedence requirements

Description : In IPv4, service type of service in header field, first 3 bits are called ______ a) Type of service b) Code bits c) Sync bits d) Precedence bits

Last Answer : d) Precedence bits

Description : In the warrant of precedence, the Speaker of the Lok Sabha comes next only to (A) The President (B) The Vice-President (C) The Prime Minister (D) The Cabinet Ministers

Last Answer : (C) The Prime Minister

Description : What si the difference between interface and abstractclass Select Answer:  1. interface contain only methods  2. we can't declare a variable for interface  3. interface contain only events  4. None  5. All

Last Answer : Ans : 2 The only Difference between Interface and Abstract class is we can declare a variable in abstract class but we can't declare in variable interface

Description : What is the lifespan for items stored in ViewState? Select Answer:  1. Item stored in ViewState exist for the life of the current page  2. Item stored in ViewState exist for the life ... of the current Applicaiton  4. Item stored in ViewState exist for the life of the current configuration

Last Answer : 1. Item stored in ViewState exist for the life of the current page AS any web application works on request and response basis ,so on every post backs, The data in control gets lost. To retain page ... control with data. The life cycle of the view state exist for life of current running page only. 

Description : Which one of the following tools is used to view the metadata information contained in a .NET assembly? Select Answer:  1. al.exe  2. ilasm.exe  3. vbx.exe  4. csc.exe  5. ildasm.exe

Last Answer :  5. ildasm.exe

Description : How would you ensure that all relevant registry entries were removed in the event that installation of your application failed?

Last Answer : You can ensure that registry entries are removed, as well as perform any other “clean-up” tasks, by creating an Installer class and writing the appropriate code in the Rollback event handler. Then create a new Custom Action and set the InstallerClass, and EntryPoint properties to appropriate values.

Description : Describe a general strategy for creating a setup project that terminates installation if a specific file is not already installed on the target machine.

Last Answer : First, create a file search to search the file system for the specific file. Then create a launch condition to evaluate the results of the search. You can connect the launch condition to ... in the search's Property property in the expression specified by the launch condition's Condition property. 

Description : What is the purpose of a bootstrapper application? When do you not need to create one?

Last Answer : A bootstrapper application automatically detects if Windows Installer is installed on the target machine. If Windows Installer is not present, it installs Windows Installer before proceeding with the rest ... Installer 1.5 already installed) or have had Microsoft Installer 1.5 installed previously.

Description : What is a native image? How do you create one?

Last Answer : A native image is a precompiled version of a .NET assembly. You can create a native image of your application by using the Ngen.exe utility.

Description : Describe XCOPY deployment. Under what conditions is it useful? When can it not be used?

Last Answer : XCOPY deployment is a simple method of deployment where the DOS command XCOPY is used to copy the application directory and any subdirectories to the target machine. You can use XCOPY ... an application requires a more complex deployment or references shared assemblies, you cannot use XCOPY.

Description : What is a shared assembly? How would you create one?

Last Answer : An assembly is an assembly of which only a single copy is installed per machine. This copy can be shared by multiple applications. To make an assembly a shared assembly, you must first assign it a strong name, and then install it to the global assembly cache.

Description : Briefly highlight the differences between imperative and declarative security as they pertain to code access security.

Last Answer : Imperative security is implemented by calling methods of Permission objects in code at run time. Declarative security is configured by attaching attributes representing permissions to classes ... request assembly-wide permissions using the Assembly (assembly) directive with declarative security.

Description : Explain how to retrieve information from the configuration file at run time. How would you store information in the configuration file at design time?

Last Answer : You must first create an instance of AppSettingsReader to read the configuration file. You can then call the GetValue method to read values represented in the configuration file. To add configuration ... used to retrieve the entry. The value can be changed between executions of the application.

Description : Describe how to use code to retrieve resources at run time.

Last Answer : You must first create an instance of the ResourceManager class that is associated with the assembly that contains the desired resource. You can then use the GetString method to retrieve string resources or the GetObject method to retrieve object resources.

Description : Describe how to sign your assembly with a strong name. Why would you want to do this?

Last Answer : To sign your assembly with a strong name, you must have access to a key file or create one with the strong name utility (sn.exe). You then specify the key file in the AssemblyInfo file and ... identity, a strong name is required if you want to install your assembly to the Global Assembly Cache.