Answer Posted / swapna
In the role-based security model, access to parts of an
application are granted or denied based on the role to
which the callers belong.
A role defines which members of a Windows domain are
allowed to work with what components, methods, or interfaces
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What is ccw?
Explain what are wrapper classes?
What is transaction atomicity?
Explain the new three features of com+ services, which are not there in com (mts)?
What is com, com+ and dcom ?
Explain the disadvantages of com components?
What is jit activation?
What happens when we instantiate a .NET component ?
What are loosely coupled events?
Is the com architecture same as .net architecture?
What is reliability?
Define transaction atomicity?
Optimization technique description ?
How CCW and RCW is working?
What is the difference between com architecture and .net architecture?