Answer Posted / swapna
In the role-based security model, access to parts of an
application are granted or denied based on the role to
which the callers belong.
A role defines which members of a Windows domain are
allowed to work with what components, methods, or interfaces
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Explain the use of contextutil class?
how to register dll in COM / COM+ application
What are rcw?
Explain how to register com+ services?
what is the relational database of tables and forms
What are Interop Services?
What is availability?
Define integrity?
Is the com architecture same as .net architecture?
What is jit activation?
Explain disadvantages of com components?
Why we learn the 8085? Because we are in 21 century so why we learn 8085?
Define transaction atomicity?
Can .NET Framework components use the features of Component Services?
What is the difference between com architecture and .net architecture?