Answer Posted / swapna
The application is never disrupted or compromised by the
efforts of malicious or ignorant users.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
what is the relational database of tables and forms
Is the com architecture same as .net architecture?
Why we learn the 8085? Because we are in 21 century so why we learn 8085?
What are rcw?
What is Pinvoke?
Explain the disadvantages of com components?
What is availability?
Optimization technique description ?
What is integrity?
Explain how to make a net component talk to a com component?
What are loosely coupled events?
What is transaction atomicity?
What is security?
Is com+ dead?
What is com, com+ and dcom ?