Enviar búsqueda
Cargar
Vb net xp_07
•
0 recomendaciones
•
594 vistas
Niit Care
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 25
Recomendados
Introduction to transaction management
Introduction to transaction management
Dr. C.V. Suresh Babu
Chapter 4 u
Chapter 4 u
Sandeep Singh
Ajs 2 b
Ajs 2 b
Niit Care
Vb net xp_10
Vb net xp_10
Niit Care
File handling in c
File handling in c
thirumalaikumar3
Ajs 4 c
Ajs 4 c
Niit Care
Ajs 3 b
Ajs 3 b
Niit Care
Ajs 3 a
Ajs 3 a
Niit Care
Recomendados
Introduction to transaction management
Introduction to transaction management
Dr. C.V. Suresh Babu
Chapter 4 u
Chapter 4 u
Sandeep Singh
Ajs 2 b
Ajs 2 b
Niit Care
Vb net xp_10
Vb net xp_10
Niit Care
File handling in c
File handling in c
thirumalaikumar3
Ajs 4 c
Ajs 4 c
Niit Care
Ajs 3 b
Ajs 3 b
Niit Care
Ajs 3 a
Ajs 3 a
Niit Care
Vb.net session 07
Vb.net session 07
Niit Care
Vb.net session 06
Vb.net session 06
Niit Care
Vb net xp_06
Vb net xp_06
Niit Care
Change data capture the journey to real time bi
Change data capture the journey to real time bi
Asis Mohanty
17855584.ppt
17855584.ppt
NoorEjaz1
DDB - integrity Enfrcement
DDB - integrity Enfrcement
Rashiqa Qureshi
2 countermeasures
2 countermeasures
Mr Patrick NIYISHAKA
2 countermeasures
2 countermeasures
Mr Patrick NIYISHAKA
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Veritas Technologies LLC
DIS_Ch12_RinereTamang_revB (1).pptx
DIS_Ch12_RinereTamang_revB (1).pptx
anirudh kasturi
Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...
Principled Technologies
Vb net xp_05
Vb net xp_05
Niit Care
Oracle data capture c dc
Oracle data capture c dc
Amit Sharma
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
INT 1010 07-2.pdf
INT 1010 07-2.pdf
Luis R Castellanos
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
Microsoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
ABTO Software
Distribute Storage System May-2014
Distribute Storage System May-2014
Công Lợi Dương
Ajs 1 b
Ajs 1 b
Niit Care
Ajs 4 b
Ajs 4 b
Niit Care
Más contenido relacionado
Similar a Vb net xp_07
Vb.net session 07
Vb.net session 07
Niit Care
Vb.net session 06
Vb.net session 06
Niit Care
Vb net xp_06
Vb net xp_06
Niit Care
Change data capture the journey to real time bi
Change data capture the journey to real time bi
Asis Mohanty
17855584.ppt
17855584.ppt
NoorEjaz1
DDB - integrity Enfrcement
DDB - integrity Enfrcement
Rashiqa Qureshi
2 countermeasures
2 countermeasures
Mr Patrick NIYISHAKA
2 countermeasures
2 countermeasures
Mr Patrick NIYISHAKA
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Veritas Technologies LLC
DIS_Ch12_RinereTamang_revB (1).pptx
DIS_Ch12_RinereTamang_revB (1).pptx
anirudh kasturi
Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...
Principled Technologies
Vb net xp_05
Vb net xp_05
Niit Care
Oracle data capture c dc
Oracle data capture c dc
Amit Sharma
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal
INT 1010 07-2.pdf
INT 1010 07-2.pdf
Luis R Castellanos
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
Microsoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
ABTO Software
Distribute Storage System May-2014
Distribute Storage System May-2014
Công Lợi Dương
Similar a Vb net xp_07
(20)
Vb.net session 07
Vb.net session 07
Vb.net session 06
Vb.net session 06
Vb net xp_06
Vb net xp_06
Change data capture the journey to real time bi
Change data capture the journey to real time bi
17855584.ppt
17855584.ppt
DDB - integrity Enfrcement
DDB - integrity Enfrcement
2 countermeasures
2 countermeasures
2 countermeasures
2 countermeasures
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
Unlocking the Full Power of Your Backup Data with Veritas NetBackup Data Virt...
DIS_Ch12_RinereTamang_revB (1).pptx
DIS_Ch12_RinereTamang_revB (1).pptx
Reduce time to complete backups and restores with Transparent Snapshots with ...
Reduce time to complete backups and restores with Transparent Snapshots with ...
Vb net xp_05
Vb net xp_05
Oracle data capture c dc
Oracle data capture c dc
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
INT 1010 07-2.pdf
INT 1010 07-2.pdf
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Microsoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
Microsoft Sync Framework (part 1) ABTO Software Lecture Garntsarik
Distribute Storage System May-2014
Distribute Storage System May-2014
Más de Niit Care
Ajs 1 b
Ajs 1 b
Niit Care
Ajs 4 b
Ajs 4 b
Niit Care
Ajs 4 a
Ajs 4 a
Niit Care
Ajs 3 c
Ajs 3 c
Niit Care
Ajs 2 a
Ajs 2 a
Niit Care
Ajs 2 c
Ajs 2 c
Niit Care
Ajs 1 a
Ajs 1 a
Niit Care
Ajs 1 c
Ajs 1 c
Niit Care
Dacj 4 2-c
Dacj 4 2-c
Niit Care
Dacj 4 2-b
Dacj 4 2-b
Niit Care
Dacj 4 2-a
Dacj 4 2-a
Niit Care
Dacj 4 1-c
Dacj 4 1-c
Niit Care
Dacj 4 1-b
Dacj 4 1-b
Niit Care
Dacj 4 1-a
Dacj 4 1-a
Niit Care
Dacj 1-2 b
Dacj 1-2 b
Niit Care
Dacj 1-3 c
Dacj 1-3 c
Niit Care
Dacj 1-3 b
Dacj 1-3 b
Niit Care
Dacj 1-3 a
Dacj 1-3 a
Niit Care
Dacj 1-2 c
Dacj 1-2 c
Niit Care
Dacj 1-2 a
Dacj 1-2 a
Niit Care
Más de Niit Care
(20)
Ajs 1 b
Ajs 1 b
Ajs 4 b
Ajs 4 b
Ajs 4 a
Ajs 4 a
Ajs 3 c
Ajs 3 c
Ajs 2 a
Ajs 2 a
Ajs 2 c
Ajs 2 c
Ajs 1 a
Ajs 1 a
Ajs 1 c
Ajs 1 c
Dacj 4 2-c
Dacj 4 2-c
Dacj 4 2-b
Dacj 4 2-b
Dacj 4 2-a
Dacj 4 2-a
Dacj 4 1-c
Dacj 4 1-c
Dacj 4 1-b
Dacj 4 1-b
Dacj 4 1-a
Dacj 4 1-a
Dacj 1-2 b
Dacj 1-2 b
Dacj 1-3 c
Dacj 1-3 c
Dacj 1-3 b
Dacj 1-3 b
Dacj 1-3 a
Dacj 1-3 a
Dacj 1-2 c
Dacj 1-2 c
Dacj 1-2 a
Dacj 1-2 a
Último
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Último
(20)
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Vb net xp_07
1.
Performing Data Updates Objectives In
this lesson, you will learn to: Perform cached data updates Perform direct data updates Identify the need for concurrency management Identify the methods of maintaining concurrency in datasets ©NIIT Performing Data Updates/Lesson 7/Slide 1 of 25
2.
Performing Data Updates Problem
Statement 7.D.1 The Diaz Telecommunications Sales Manager needs to view the customer details in a customized format. In addition, the customer details need to be maintained, which involves adding new customer details, and modifying and deleting the existing ones. ©NIIT Performing Data Updates/Lesson 7/Slide 2 of 25
3.
Performing Data Updates Task
List Identify the data that needs to be maintained. Identify the mechanism to maintain data. Design a Windows Form to maintain the data. Connect to the database. Bind the data to the Windows Form controls. Write the code to maintain the data. Perform data maintenance. ©NIIT Performing Data Updates/Lesson 7/Slide 3 of 25
4.
Performing Data Updates Task
1: Identify the data that needs to be maintained. Result: As per the given problem statement, the data to be maintained is as follows: CustID FName LName Address Phone email ©NIIT Performing Data Updates/Lesson 7/Slide 4 of 25
5.
Performing Data Updates Task
2: Identify the mechanism to maintain data. Data can be retrieved from a database directly through data commands or cached in datasets. Performing cached data updates Updating the dataset ® While updating the dataset, some events are raised: ® ColumnChanging ® RowChanging ® ColumnChanged ® RowChanged ® RowDeleting ® RowDeleted ©NIIT Performing Data Updates/Lesson 7/Slide 5 of 25
6.
Performing Data Updates Task
2: Identify the mechanism to maintain data. (Contd.) ® Whileupdating the dataset, the following information is maintained: ® RowState property ® Unchanged ® Added ® Deleted ® Detached ® Modified ©NIIT Performing Data Updates/Lesson 7/Slide 6 of 25
7.
Performing Data Updates Task
2: Identify the mechanism to maintain data. (Contd.) ® DataRowVersion Enumeration ® Original ® Current ® Proposed ® Default ® The changes are committed to the dataset by calling the AcceptChanges()method. Updating the data source ® Thedata source is updated with the changed dataset by calling the Update()method of the data adapter. ©NIIT Performing Data Updates/Lesson 7/Slide 7 of 25
8.
Performing Data Updates Just
a Minute… 2. When does the RowState property have the value Detached? 3. What is the relationship between the RowState property and the DataRowVersion enumeration? ©NIIT Performing Data Updates/Lesson 7/Slide 8 of 25
9.
Performing Data Updates Task
2: Identify the mechanism to maintain data. (Contd.) Performing direct data updates Data commands are can be used to directly update the data source. A data command object can be derived from the OleDbCommand class or the SqlCommand class. For executing a data command, the Connection, CommandText, and the Parameters properties for the data command have to be set. ©NIIT Performing Data Updates/Lesson 7/Slide 9 of 25
10.
Performing Data Updates Task
2: Identify the mechanism to maintain data. (Contd.) Result: Since you need to access the data through a dataset, you will perform a cached data update. ©NIIT Performing Data Updates/Lesson 7/Slide 10 of 25
11.
Performing Data Updates Just
a Minute… 1. In which cases, direct data update is preferred to updates through datasets? 2. Write a code to connect to a database through data commands. ©NIIT Performing Data Updates/Lesson 7/Slide 11 of 25
12.
Performing Data Updates Task
3: Design a Windows Form to maintain the data. Task 4: Connect to the database. Task 5: Bind the data to the Windows Form controls. Task 6: Write the code to maintain the data. Task 7: Perform data maintenance. ©NIIT Performing Data Updates/Lesson 7/Slide 12 of 25
13.
Performing Data Updates Maintaining
Data Concurrency Concurrency control is the process of ensuring that in case many people attempt to modify data in a database at the same time, modifications made by one person do not adversely affect those of another person. Method Description Pessimistic concurrency control In this type of concurrency control, a system of locks applied does not allow users to modify data in a way that affects other users. When a lock is applied, other users cannot perform actions that would conflict with the lock until the owner releases it. Pessimistic control is mainly used in environments where the data contention is high and protecting data with locks is less costly than rolling back transactions in case of concurrency conflicts. Pessimistic concurrency is not possible in a disconnected architecture. ©NIIT Performing Data Updates/Lesson 7/Slide 13 of 25
14.
Performing Data Updates Maintaining
Data Concurrency (Contd.) Method Description Optimistic concurrency control In this type of concurrency control, the lock is not applied when the users read the data. When the user performs a data update, the system checks to see if the data has been changed by another user after the data was read. If the data has been changed, an error is raised. Optimistic concurrency is used in environments where the data contention is low and protecting data with locks is more costly than rolling back transaction in case of concurrency conflicts. ‘Last in Wins’ concurrency control This type of concurrency control works in a similar way as the optimistic concurrency control, with the difference that the record is updated regardless of whether the record has been changed or not. ©NIIT Performing Data Updates/Lesson 7/Slide 14 of 25
15.
Performing Data Updates Maintaining
Data Concurrency (Contd.) ADO.NET implements optimistic concurrency by using the following two methods: The Version number method ® Theversion number method requires the record to be updated to have a datetime stamp or a version number column. The saving all values method ® When the data is retrieved, a copy of all fields, that is, the original version is maintained on the client. ©NIIT Performing Data Updates/Lesson 7/Slide 15 of 25
16.
Performing Data Updates Just
a Minute… What is the difference between the concurrency control through the Saving All method and the Version Number method? ©NIIT Performing Data Updates/Lesson 7/Slide 16 of 25
17.
Performing Data Updates Optimistic
Concurrency through Data Adapter By default, the data adapters that are created in an application implement optimistic concurrency. ©NIIT Performing Data Updates/Lesson 7/Slide 17 of 25
18.
Performing Data Updates Problem
Statement 7.P.1 The Sales Manager of Diaz Telecommunications needs to maintain customer details, which involves adding new customer details, and modifying and deleting existing customer details. While adding and modifying details, the application should ensure that no field is left blank. ©NIIT Performing Data Updates/Lesson 7/Slide 18 of 25
19.
Performing Data Updates Summary In
this lesson, you learned that: Data can be retrieved from a database directly through data commands or can be cached in datasets. When a dataset is used to access data, updating the database consists of two steps, updating the dataset and updating the database. When you make changes to a record in the table, the following events are raised by the DataTable object: ColumnChanging RowChanging ColumnChanged ©NIIT Performing Data Updates/Lesson 7/Slide 19 of 25
20.
Performing Data Updates Summary
(Contd.) RowChanged RowDeleting RowDeleted The ColumnChanging and RowChanging events raised by the DataTable object are used to validate the dataset while updating it. When changes are made in a dataset, that is, a row is added, deleted, or modified, some information about each update has to be maintained. ©NIIT Performing Data Updates/Lesson 7/Slide 20 of 25
21.
Performing Data Updates Summary
(Contd.) The data adapter uses the following information while updating the data source: The RowState property — The RowState property of the DataRow object indicates the current state of the record. The DataRowVersion enumeration — A dataset can maintain four versions of a DataRow object: Current, Original, Proposed, and Default. After the changes have been made, they are committed to the dataset by calling the AcceptChanges() method of the dataset to accept the changes made to the dataset. ©NIIT Performing Data Updates/Lesson 7/Slide 21 of 25
22.
Performing Data Updates Summary
(Contd.) The data source is updated with the changed dataset by calling the Update() method of the OleDbDataAdapter class. Data commands are generally used in the following cases: To work with stored procedures that return a result set, which can be manipulated To access data that is not appropriate for storing in a dataset, such as data with a short life cycle To access read-only data, that is, data that will not be updated A data command object can be derived from the OleDbCommand class or the SqlCommand class. ©NIIT Performing Data Updates/Lesson 7/Slide 22 of 25
23.
Performing Data Updates Summary
(Contd.) A data command object can be derived from the OleDbCommand class or the SqlCommand class. For executing a data command, the Connection and the CommandText properties for the command have to be set for specifying the connection and the SQL query to be executed to retrieve the data, respectively. ‘Concurrency’ means ‘at the same time’; thus, concurrency management means to decide the action that will take place when multiple users try to update the same record. ©NIIT Performing Data Updates/Lesson 7/Slide 23 of 25
24.
Performing Data Updates Summary
(Contd.) There are three concurrency management methods available: Pessimistic concurrency control — In this type of concurrency control, a record is not available to other users from the time that a user begins to edit the record till the time that the record is updated in the database. Optimistic concurrency control — In this type of concurrency control, the record is not available to other users only when the record is being updated in the database. When a user tries to update a record that has been changed, an error occurs. ©NIIT Performing Data Updates/Lesson 7/Slide 24 of 25
25.
Performing Data Updates Summary
(Contd.) Last in Wins concurrency control — This type of concurrency control works similar to the optimistic concurrency control, the only difference being that the record is updated without checking whether the record has been changed or not. When the row is changed and there is an attempt to update the database, ADO.NET uses two methods to determine if any changes have occurred: The Version number method The saving all values method By default, the data adapters that are created in an application implement optimistic concurrency. ©NIIT Performing Data Updates/Lesson 7/Slide 25 of 25