Well Abhinav probably gave you the right answer already. I want to add though that doing what you are doing is not a good practice. You should aways parameterize your queries for performance and safety (all those SQL injection attacks you've been hearing about were caused by queries that were not parameterized!) ;)
Try the following instead!
dbCommand = new SqlCommand("SELECT CountryName, Results.CountryId FROM Results,Country WHERE Country.CountryId = Results.CountryId AND GameId = @GameId '");
cmd.Parameters.AddWithValue("@GameId", cboGameID.SelectedValue);
@GameId will be replaced with the value you specified in the parameter and SqlServer does the rest :)
No SQL injection, no performance hit, your query will be cached, your code looks cleaner, everyone wins!
Hope that helps :)