why we use one step and two step in STO. please explain end to end sto process .Don't explain the configuration only process how it starts and where it ends
2 15482In case only Gateway server goes down, then what is the impact in existing on new users trying to login the Siebel application?
5 12379where can u check the sap errors in windows as the windows system was down.some have windows admin make the system up.where u check the error logs ?how to find the problem is with the os or sap?
1 5434What is the purpose of webdisptcher and Installing and configuring Web Dispatcher what are the prerequisites?
2562What is the purpose of webdisptcher and Installing and configuring Web Dispatcher what are the prerequisites?
2 9094Post New Fujitsu Interview Questions
what is mean by nitrosamine impurities?
What is the use of attributehierarchyvisible ? : sql server analysis services, ssas
During insert operation in Netezza Connector, if we give direct option as Yes , is there any issue?
How will you integrate hibernate with spring framework?
Describe your ideal job at Meijer.
What are the log files generated by apache?
Which sql query platform are you using to communicate with redshift?
What is the tag property useful for?
How to rollback last migration?
A banker has a seif with a cipher. Not to forget the cipher, he wants to write it coded as following: each digit to be replaced with the difference of 9 with the current digit. The banker chose a cipher. Decipher it knowing the cipher starts with a digit different than 9. I need to write a program that takes the cipher from the keyboard and prints the new cipher. I thought of the following: Take the input from the keyboard and put it into a string or an array. Go through the object with a for and for each digit other than the first, substract it from 9 and add it to another variable. Print the new variable. Theoretically I thought of it but I don't know much C. Could you give me any kind of hint, whether I am on the right track or not?
How do I subscribe to an rss feed on my iphone?
Is android unix based?
What is Metamask?
What is Inheritance in C#?
what are important lanfree parameters to be added in dsm.sys?