This C#.Net test comprises of various types of objective questions to help you
assess your C#.net programming knowledge. This objective C#.NET test covers
questions on various Theoretical and practical aspects of C#.NET programming.
This is a set of 38 practice questions on C#.NET programming with some sample
C#.NET objective questions.The score at the end of C#.NET practice test will
help you understand how you will be perceived by the interviewer.
Online Practice
Test > C#.NET Test
Click here to start
C#.NET objective test
Here are few sample C#.NET objective test
How many web.config files that can be there an ASP.NET application?
Options
only one
only two
upto 10
more than one
Difference between Convert.ToString() and ToString()
Options
Convert.ToString() handle null values but ToString() don't
ToString() output as per format supplied
Convert.ToString() only handle null values
ToString() handle null values but Convert.ToString() don't
Which of the following is incorrect about System.Text.StringBuilder and
System.String?
Options
StringBuilder is more efficient when there is a large amount of string
manipulation
Strings are immutable, so each time a string is changed, a new instance in
memory is created.
StringBuilder is mutable; when you modify an instance of the StringBuilder
class, you modify the actual string, not a copy
Strings are mutable in .Net
Click here to start
C#.NET objective test
More Links
ASP.NET AJAX is the name of Microsoft’s AJAX solution, and it refers to a set of
client and server technologies that focus on improving web development with
Visual Studio. Other companies have their own AJAX solution, often taking a
radically different approach...........
Latest answer: Code access security is a mechanism that helps
limit the access to the code by protecting the resources. It defines
permissions which tell about the rights to access various. It also imposes
restrictions on code at run time..............
Read answer
Latest answer: Application that provide access to its data
based on credentials check, verify the user’s role and hands over the access on
the basis of such roles.............. .
|