Important: |
---|
This is retired content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This content may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |
The following table shows the Storage structures with a description of the purpose of each.
Note: |
---|
Windows Mobile may not support all of the programming elements in this section. For information about differences between the COM implementation available for Windows Mobile devices and that available for Windows Embedded CE devices, see COM and DCOM in Windows Mobile Devices. |
Programming element | Description |
---|---|
A BSTR, known as basic string or binary string, is a pointer to a wide character string used by Automation data manipulation functions. |
|
This structure represents a user name and password. |
|
This structure is enumerated by the IEnumConnections::Nextmethod. |
|
This structure is used in the IViewObject::Drawmethod to optimize rendering of an inactive object by making more efficient use of the GDI. |
|
A handle that identifies a type description. |
|
The interface or dispinterface represents the default for the source or sink. This member of a coclass is called rather than implemented. The member should not be displayed or programmed by users. Sinks should not receive events through the VTBL. |
|
This structure contains information about incoming calls. |
|
This data type identifies a locale for national language support. |
|
This structure contains parameters that describe the licensing behavior of a class factory that supports licensing. |
|
To optimize network performance, most remote activation functions take an array of MULTI_QIstructures rather than just a single IID as input and a single pointer to the requested interface on the object as output, as do local machine activation functions. |
|
This structure defines a verb that an object supports. |
|
This structure identifies an authentication service that a server is willing to use to communicate to a client. |
|
This structure specifies each advisory connection. |
|
This structure contains statistical information about an open storage, stream, or byte array object. |
|
This structure contains the size of the object store and the amount of free space currently in the object store. |
|
This structure is used to identify an instance of the store. |
|
This structure contains information about a type library. |