How to connect oracle database from unix5 45259
The UNIX shell is.... a).does not come with the rest of the system b).forms the interface between the user and the kernal c) does not give any scope for programming d) deos not allow calling one program from with in another e) all of the above2 4028
The very first process created by the kernal that runs till the kernal process is haltes is6 8897
What are setuid/setgid in relation to file permissions?2 8515
What are the main differences between Apache 1.x and 2.x?1 6340
What does iostat do?4 8383
What is the difference between Swapping and Paging?4 49611
how to face veritas NetBAckup interview, where did i find all materials regrding veritas and give details on veritas certification13 75166
why unix command can be divided into internal and external command1 5141
If Media Server fails. What are the steps to be followed? Can anyone please reply for this question Thanks, Ganesh1836
What is file constructing in UNIX/AIX ?2 5303
What is the difference between a Virtual Server and a Dedicated Server?
1) Explain different type of Users? Explain specifically Service User? 2) Difference between System and Communication User?Explain in Context of Profile Parameter? 3) There are 5 systems say BI, SOLMAN, CRM, PI, SRM etc etc. Which system will act as a satellite system in CUA and Why? HOw CUa system works? 4) State different types of Transactions & Tables in Strutural Authorization Profile in HR Security? 5) What is L0 , L1 , L2 , L3 , L4 code called in HR Security? 6) What fields are required to create Strutural Authorization Profile in HR Security? State significance of Evaluation Path? 7) What is Structural Authorization Profile in HR Security? When required Role has already been assigned to User then why Structural Authorization Profile is required by user? 8) How are structural Authorization Profile are created? 9) Important Authorization Object in HR Security? 10) Fields in P_ORGIN A.O? 11) Important infotypes and What is PA? 12) How access is provided for tables to user? Significance of Authorization Group in TDDAT table? 13) Difference between SU22 and SU24? 14) Explain Authorization Structure? 15) Which table stores the Authorization Object of a User? 16) What we do to keep Roles consistent in DEV QAS and PRD? 17) A User has create and display access? Will he have access to change as well? 18) How User can have access to view salary slip of other employees(HR Security)?Explain in detail. 19) In HR security does we add Employee ID anywhere in Roles? 20) Any issue you have faced while Transport? 21) Have you faced any issue in Upgrade? Expalain how to compare Roles from older version of SAP to new version of SAP? 22) Any typical issue you have resolved in HR Security?
How to create Reusable and Multiple Actions?
LET ME NOW MORE ABOUT icu and ics for circuit breaker. how we calculate the rating of circuit breaker and i c u and ics values
Do you want to ask us something about the company?
What is principle of Floroscent tube 36watt.
What is the Tux IPC Helper?
Name the Accounting Concepts
EXPLAIN METOD OF IMAGE OF TRANSMISSION LINE/ WHAT ARE ITS PRACTICAL APPLICATION?
What truth-in-advertising rules apply to advertisers? Under the Federal Trade Commission Act?
How to Deleting Session Data in Laravel ?
what is the variable and verticals of a firm or a consultency
Which dictionary view(s) would you first look at to understand or get a high-level idea of a given Advanced Replication environment?
What are the differences in posttranslational modification ?
What items of information about a task might be useful in real time scheduling?