Solved

Which of the following should you perform to quickly install your updated assembly?

Posted on 2006-11-06
4
977 Views
Last Modified: 2009-07-29
Shortly after releasing a new Windows service, you discovered that there is a calculation error in a shared assembly the application uses. You corrected the error and are ready to install the new assembly on the client computers. Which of the following should you perform to quickly install your updated assembly?
Copy the assembly's .dll to the appropriate folder on the client computer.
 
 
--------------------------------------------------------------------------------
 
  Run the GACUTIL.EXE utility on the client computer.
 
 
--------------------------------------------------------------------------------
 
  Copy the assembly's .dll to the appropriate folder on the client computer and then run the GACUTIL.EXE utility on the client computer.
 
 
--------------------------------------------------------------------------------
 
  Copy the assembly's .dll to the appropriate folder on the client computer and then run the GACUTIL.EXE and csc.exe utility on the client computer.
 
 
0
Comment
Question by:mathieu_cupryk
  • 2
  • 2
4 Comments
 

Author Comment

by:mathieu_cupryk
ID: 17885137
Copy the assembly's .dll to the appropriate folder on the client computer.
 
0
 
LVL 15

Expert Comment

by:ozymandias
ID: 17885152
Are you answering you own questions now ?
0
 

Author Comment

by:mathieu_cupryk
ID: 17885156
Is this correct?
0
 
LVL 15

Accepted Solution

by:
ozymandias earned 250 total points
ID: 17885276
No, I think you would need to run GACUTIL as well or use Windows Explorer to drag the assembly into the cache.
Assemblies in the cache have strong names and are checked too see if they have been changed or tampered with.
If you deploy a new version of an assembly that needs to reside in the GAC you have to import the updtaed assmbly into the GAC.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: Najam
Having new technologies does not mean they will completely replace old components.  Recently I had to create WCF that will be called by VB6 component.  Here I will describe what steps one should follow while doing so, please feel free to post any qu…
Real-time is more about the business, not the technology. In day-to-day life, to make real-time decisions like buying or investing, business needs the latest information(e.g. Gold Rate/Stock Rate). Unlike traditional days, you need not wait for a fe…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now