i am asked to get through at "Authorizations analysis and correct assignments" wat does it mean and wat all concepts comes under these ?
3 7887a user is not able to execute a t-code ; hou do u solve that ? wat are the difft reasons that might be existing ?
2 17924what are the profiles that are related to transports ? what are the A.O related to transports ?
3 11173In an environment of derived roles ; a user is asking for a t-code ; which is not found in suim in search of roles ? what will u do ?
4 12088hi..guys... can u tell me? what is the solution manager.. and what is the use? which type of commands we should follow?
2 7881Post New IBM SAP Security Interview Questions
what are the Types of End User in dbms?
Where register variables are stored in c?
How do I mix jsp and ssi #include? What is the difference between include directive & jsp:include action?
what is the need to express current and voltage in rms value? rms value is also called as effective value,what is effective value?
What are different types of tables in sql?
How do I run a bash script in linux?
Tell us how can we access the data sent through the url with the post method?
What is tokenization in nlp?
What about your experience with EDI idoc, can you elaborate a bit of what’s your experience working with EDI and IDoc?
how to implement some securty aspect in our application i.e 1.cookie poisioning. 2.data encryption. 3.forcefull browsing 4.sql/code injection 5.securing web app by using web services ........my question is how to implement these thing in our application is this done by hard coding or by help of some tool
How do I handle the back and forward buttons?
Can have i call constructor in interface?
How to calculate the area of the polygon in d3.js?
Explain whats flask?
What is mean by data types in c?