Answer Posted / swapna
In the role-based security model, access to parts of an
application are granted or denied based on the role to
which the callers belong.
A role defines which members of a Windows domain are
allowed to work with what components, methods, or interfaces
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What is Pinvoke?
What is transaction atomicity?
Why we learn the 8085? Because we are in 21 century so why we learn 8085?
Explain how to register com+ services?
Explain the new three features of com+ services, which are not there in com (mts)?
What is the difference between com architecture and .net architecture?
Define durability?
Is it true that COM objects no longer need to be registered on the server?
What is jit activation?
What are rcw?
Explain how does you handle this com components developed in other programming languages in .net?
Explain disadvantages of com components?
Define jit activation?
how to register dll in COM / COM+ application
Define object pooling?