COM+ Interview Preparation Guide

Strengthen your COM+ interview skills with our collection of 29 important questions. Each question is designed to test and expand your COM+ expertise. Suitable for all experience levels, these questions will help you prepare thoroughly. Download the free PDF to have all 29 questions at your fingertips. This resource is designed to boost your confidence and ensure youre interview-ready.
Tweet Share WhatsApp

29 COM+ Questions and Answers:

1 :: Which namespace do the classes, allowing you to support COM functionality, are located?

System.EnterpriseServices
Download PDFRead All COM+ Questions

2 :: Define manageability?

Deployment and maintenance of the application is as
efficient and painless as possible.

3 :: Define security?

The application is never disrupted or compromised by the
efforts of malicious or ignorant users.

4 :: Define availability?

Users can depend on using the application when needed.

5 :: Define scalability?

The application meets its requirement for efficiency even
if the number of users increases.
Download PDFRead All COM+ Questions

6 :: What is reliability?

The application generates correct and consistent
information all the time.

7 :: Explain loosely coupled events?

Loosely coupled events enable an object (publisher) to
publish an event. Other objects (subscribers) can subscribe
to an event.

COM+ does not require publishers or subscribers to know
about each other. Therefore, loosely coupled events greatly
simplify the programming model for distributed
applications.

8 :: Explain queued components?

The queued components service enables you to create
components that can execute asynchronously or in
disconnected mode.

Queued components ensure availability of a system even when
one or more sub-systems are temporarily unavailable.
Consider a scenario where salespeople take their laptop
computers to the field and enter orders on the go.


Because they are in disconnected mode, these orders can be
queued up in a message queue. When salespeople connect back
to the network, the orders can be retrieved from the
message queue and processed by the order processing
components on the server.

9 :: Explain role-based security?

In the role-based security model, access to parts of an
application are granted or denied based on the role to
which the callers belong.

A role defines which members of a Windows domain are
allowed to work with what components, methods, or interfaces

10 :: What is JIT activation?

The objective of JIT activation is to minimize the amount
of time for which an object lives and consumes resources on
the server.

With JIT activation, the client can hold a reference to an
object on the server for a long time, but the server
creates the object only when the client calls a method on
the object.

After the method call is completed, the object is freed and
its memory is reclaimed. JIT activation enables
applications to scale up as the number of users increases.
Download PDFRead All COM+ Questions