Why do we need to apply support package thru client 000?
Answer Posted / manjesh s
Spam/saint/support package should happen in cross client components so this should happen in 000 client which will be inheritable to all other clients too..
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are the different types of rfc and explain what transactional rfc is?
How do you kill a job in SAP?
How do you check the users logs in your system and how many sessions each user is generating?
Is sap a database ?
when ever i try to installed sap ecc6.0 sr2 on single system. it show error on phase import abap "Not all objects are successfully processed. DIAGNOSIS: for details see output file with invalid object invalid_objects.txt and log file object_checker.log . SOLUTION: normally it indicate the data load error but in some special cases( for example if some object were created or loaded externally) you can press ok to continue" here error sentence is complete. pls tell what actual error its? is it kernel file related?
In the Sap Easy Access Menu I see the menu System -> User Profiles ->Own Data. Other options Hold Data is to keep data values that you have entered in a field of an application for the duration of the session; SET DATA not to overwrite the data and DELETE DATA to delete the set data. Can somebody explain me the Hold Data, Set Data and Delete Data with examples, i mean giving an example of fields?
While doing implementation do you get any issues?
How can you view locked transactions?
What is the different type of users in sap?
IN FUNCTIONAL MODULE SD WE UNFORTUNETLY DELETE OUR ONE ITEM CATEGORY "TAN" FOR THAT WE WANT RECOVER IT WHAT ARE THE PROCEDURES. IS THERE ANY PROCEDURES LIKE RECYCLEBIN. TELL US DETAIL PROCEDURES STEP BY STEP PLEASE
What is the use of kernel in sap system? How do you check the current kernel version in sap system?
What is the folder it will ask to install oracle?
What is the use of account id in logon tab?
What is your organization’s security philosophy? What level of security does your data require? How much risk are you willing to assume in each application area?
How to identify a particular T_Code has been modified or not? If yes, how to identify who modified particular T_Code in current system?