Which methods allow COM components to be used in .NET applications?()A、 Add a reference to the component throudh Microsoft Visual Studio 2005.B、 Use the type Library Import tool (TlbImport.exe).C、 Use the Regsvr32 tool.D、 Ensure thet the application is registered, using the RegSvr tool if necessary. Then either add a reference to it from dialog box or use TblIpm.exe.

Which methods allow COM components to be used in .NET applications?()

  • A、 Add a reference to the component throudh Microsoft Visual Studio 2005.
  • B、 Use the type Library Import tool (TlbImport.exe).
  • C、 Use the Regsvr32 tool.
  • D、 Ensure thet the application is registered, using the RegSvr tool if necessary. Then either add a reference to it from dialog box or use TblIpm.exe.

相关考题:

Which of the following scheduling methods uses more of the risk management concepts:A ADMB PDMC CPMD PERTE Gantt

Which one of the following is not an acquisition method?A advertisingB invitationC negotiationD purchaseE all are acquisition methods

There are four methods of government procurement. Which is not one of these methods?A AssistanceB Sealed biddingC Competitive proposalsD AcquisitionE Small purchases

161 There are four methods of government procurement. Which is not one of these methods? A. AssistanceB. Sealed biddingC. Competitive proposalsD. AcquisitionE. Small purchases

Which is the branch of linguistics which studies the characteristics of speech sounds and provides methods for their description, classification and transcription?A.PhoneticsB.PhonologyC.SemanticsD.Pragmatics

Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP

Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP

Which of the following methods can move files in clear text and can be easily intercepted?()A、RSHB、SNMPC、FTPD、TELNET

Which of the following archiving methods only backs up data that has changed since the previous full backup?()A、SnapshotB、IncrementalC、CopyD、Differential

Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A、OSPFB、IS-ISC、EIGRPD、BGP