Answer Posted / swapna
The application is never disrupted or compromised by the
efforts of malicious or ignorant users.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Optimization technique description ?
What is durability?
What is Pinvoke?
what is the relational database of tables and forms
What are Interop Services?
Explain disadvantages of com components?
What is scalability?
What is security?
What is the difference between com architecture and .net architecture?
What is ccw?
Define object pooling?
Explain how does you handle this com components developed in other programming languages in .net?
how to register dll in COM / COM+ application
Can .NET Framework components use the features of Component Services?
Explain the disadvantages of com components?