can sn.exe can be used before gacutil.exe

Answers were Sorted based on User's Feedback



can sn.exe can be used before gacutil.exe..

Answer / ajay solanki

as per knowledge first we need to generate strong Name for
an Assembly using sn.exe before insatalling shared Assembly
into global assembly cache using Gacutil.exe

Is This Answer Correct ?    3 Yes 0 No

can sn.exe can be used before gacutil.exe..

Answer / lily antony

Yes. First we have to use the sn.exe and generate a strong
name key pair to sign the assembly. [After signing it
becomes a shared assembly. ]

Then we have to use the gacutil.exe to install the signed
assembly into the Global Assembly Cache.

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More ASP.NET Interview Questions

What is route in web api?

0 Answers  


Explain what does wsdl stand for?

0 Answers  


what is difference between User Control,Custom Contro1,Web server control and template controls

1 Answers  


accessing a textbox that was created dynamically? for (int i = 0; i < t1; i++) { TextBox t2 = new TextBox(); t2.ID = "adf" + i; PlaceHolder1.Controls.Add(t2); } accessing data entered in the above created controls.

1 Answers  


How to implement role based security in asp.net mvc? : Asp.Net MVC

0 Answers  






What is viewstate? In which event of the page life cycle, is the viewstate available?

0 Answers  


What is jade template engine?

0 Answers  


To redirect the user to another page which method do we use without performing a round trip to the client?

0 Answers   Siebel,


In asp.net, if a webpage seems too slow to load completely in th ebrowser. In this case what are the checkings or actions you will take to rectify the slowness or which are the factors related to this issue? How we can trace it?

3 Answers  


What is the difference between session and viewstate?

0 Answers  


Explain the difference between debug.write and trace.write? When should each be used?

0 Answers  


Do ASP.NET forms authentication cookies provide any protection against replay attacks? Do they, for example, include the client's IP address or anything else that would distinguish the real client from an attacker?

1 Answers  


Categories