Answer Posted / swapna
In the role-based security model, access to parts of an
application are granted or denied based on the role to
which the callers belong.
A role defines which members of a Windows domain are
allowed to work with what components, methods, or interfaces
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What is integrity?
What is com, com+ and dcom ?
Define jit activation?
What is transaction atomicity?
Explain the disadvantages of com components?
What is availability?
What is ccw?
how to register dll in COM / COM+ application
Is it true that COM objects no longer need to be registered on the server?
Is com+ dead?
what is the relational database of tables and forms
How CCW and RCW is working?
What is reliability?
What are Interop Services?
How to make a net component talk to a com component?