.NET Tutorials, Forums, Interview Questions And Answers
Welcome :Guest
 
Sign In
Register
 
Win Surprise Gifts!!!
Congratulations!!!


Top 5 Contributors of the Month
david stephan

Home >> Interview Question >> .NET Framework >> Post New Question Subscribe to Interview Questions

What are Access Modifiers

Posted By :Karthikeyan Anbarasan     Posted Date :May 30, 2011    Points :40   Category :.NET Framework 
Public - Access to same assembly or another assembly that references it.

Private - Access to same class or struct.

Protected - Access to same class or struct, or in a class that is derived.

Internal - Access to any code in the same assembly, but not from another assembly.

Protected Internal - Access to any code in the assembly in which it is declared, or from within a derived class in another assembly.


You can also find related Interview Question to What are Access Modifiers  below: 

Explain about public and protected Access Modifiers?

  
Public:

public is an access modifier for types and type members. This is the most permissive access level as there are no restrictions on accessing a public type or type member.

protected:

protected is an access modifier for type members only. A protected member is only accessible within the body of the containing type and from within any classes derived from the containing type (More...)

Explain about private and internal Access Modifiers?

  
Private:
========
private is an access modifier for type members only. private access is the least accessible and such members are only accessible within the body of the containing type.
Note that nested types within the same containing body can also access those private members.

Internal:
--------
internal is an access modifier for types and type members. internal members are accessible only within file of the same assembly. It is an error to reference an internal type or internal type member outside the assembly within which it was declared.

A common use of internal access is in component-based development because it enables a group of components to interact in a private matter without being exposed to the outer world. For example, a Data Access Layer could have several classes with internal members that are only used by the DAL.
(More...)

What are class access modifiers ?

  
Access modifiers are keywords used to specify the declared accessibility of a member or a type. This section introduces the four access modifiers:
. Public - Access is not restricted.
. Protected - Access is limited to the containing class or types derived from the containing class.
. Internal - Access is limited to the current assembly.
. Protected inertnal - Access is limited to the current assembly or types derived . from the containing class.
. Private - Access is limited to the containing type.
(More...)

What is the Difference between Internal and Protected Internal Access Modifiers?

  
Internal :

It can be accessed by any code in the same assembly but cannot be accessable in another assembly

Protected Internal :

It can be accessed by any code in the same assembly, or by any derived class in another assembly. For a particular project. (More...)

What are the event's access modifiers ?

  
Event's are always public can be used where ever registered. But we can have access modifiers in events.Wecan have events with protected keyword which will be accessible only to inherited classes.We can have private events only for that class. (More...)

How many Access Modifiers in JAVA?

  
It's having Three Access Modifiers.
1.Private
2.Public
3.Protected
(More...)

How many Access Modifiers in C# or ASP.Net?

  
It's having Four Access Modifiers.
1.Private
2.Public
3.Protected
4.Internal
(More...)

What is Active Directory? What is the namespace used to access the Microsoft Active Directories? What are ADSI Directories?

  
Active Directory Service Interfaces (ADSI) is a programmatic interface for Microsoft Windows Active Directory. It enables your applications to interact with diverse directories on a network, using a single interface. Visual Studio .NET and the .NET Framework make it easy to add ADSI functionality with the DirectoryEntry and DirectorySearcher components.

Using ADSI, you can create applications that perform common administrative tasks, such as backing up databases, accessing printers, and administering user accounts. (More...)

What is CODE Access security?

  
CAS is part of .NET security model that determines whether or not a piece of code is allowed to run and what resources it can use while running. Example CAS will allow an application to read but not to write and delete a file or a resource from a folder. (More...)

If any .NET language has access to everything in the Base Class Library, why is there so much talk about C#?

  
Although in theory all .NET languages have equal access to the BCL, in reality it was left up to the language teams to determine what level of support they wanted to offer, at least beyond the minimums needed for basic compliance. In our opinion, C#, because it was developed as a new language specifically for the .NET platform, has the best support for .NET applications. (More...)

What is CODE Access security?

  
Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions.

It performs following function
1. Defines permissions and permission sets that represent the right to access various system resources.
2. Enables administrators to configure security policy by associating sets of permissions with groups of code (code groups).
3. Enables code to request the permissions it requires in order to run, as well as the permissions that would be useful to have, and specifies which permissions the code must never have.
4. Grants permissions to each assembly that is loaded, based on the permissions requested by the code and on the operations permitted by security policy.
5. Enables code to demand that its callers have specific permissions.
6. Enables code to demand that its callers possess a digital signature, thus allowing only callers from a particular organization or site to call the protected code.
7. Enforces restrictions on code at run time by comparing the granted permissions of every caller on the call stack to the permissions that callers must have. (More...)

How customizable is the user-to-user access in SHarePoint?

  
User permissions apply to an entire SharePoint Website, not to documents themselves. However, you can have additional sub webs that can optionally have their own permissions. Each user can be given any offer default roles. Additional roles can be defined by the administrator. (More...)

Quick Links For Interview Questions Categories:
ASP.Net Windows Application   .NET Framework   C#   VB.Net   ADO.Net  
Sql Server   SharePoint   Silverlight   OOPs   JQuery   JavaScript/VBScript
Biztalk Patten/Practices .IIS WCF WPF WWF
Networking Aptitude Others   All      

Find questions, FAQ's and their answers related to .NET, C#, Vb.Net, Sql Server and many more.

 
Now you can find lots of .NET, C#, Vb.Net, SQL Server,Windows, ASP.Net related Questions and their Answers here at www.dotnetspark.com. Our aim is to help you pass your certification Exams (MCP, MCSD, MCAD etc.,) with flying scores and get good name in your company.

So, Start looking our Interview Question section daily and improve your .NET Skills. You can also help others by posting Interview Questions and their Answers in this section.


Hall of Fame    Twitter   Terms of Service    Privacy Policy    Contact Us    Archives   Tell A Friend