Answer Posted / swapna
The application is never disrupted or compromised by the
efforts of malicious or ignorant users.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Optimization technique description ?
What are loosely coupled events?
Is com+ dead?
Define jit activation?
What is manageability?
What is the difference between com architecture and .net architecture?
Explain the new three features of com+ services, which are not there in com (mts)?
Define transaction atomicity?
How to register com+ services?
How CCW and RCW is working?
What is durability?
What is com, com+ and dcom ?
Explain how to make a net component talk to a com component?
Define integrity?
Define object pooling?