how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS
2275how a programmer confirms that the data submitted has been succesfully inserted into the database(either oracle or my sql).. How a programmer confirm if there is any problem with the program he wrote for insertion
2 5981when a request is generated from apache tomcat 5.5 and goes to oracle 10g or mysql,,, how the oracle or mysql reads the request as apache is a web server and oracle 10g is application server? when the oracle 10g provides response, how the apche tomcat reads it???
2112how we can use debug in myeclipse 6.0 in order solve the problems that exist in our program when there are 900 to 1000 pages in a web application
2094what is the role of xml in core java?? and how we can use it?? can somebody give a sample program with explanation and from where i can read more about xml?????
2196In Open SQL statements such as Insert update delete which one is FASTlLY retrieve the results and which one is Efficient?
4 10854can anyone please explain the main difference betweeen campaign management and trade promotion and the purpose of there usage.
1 3741Hi, I need information about the tables of interactive scripting. Where the script saved in The Crm tablas ? Is there a connection to the Activity tablas?
1 5919Post New SAP Labs Interview Questions
What are all the important protocols that load runner supports?
In the OTA, the transconductance is controlled by A The ac supply voltage B A bias current C The input signal voltage D The manufacturing process
hi friends pls send to me any one have or guide me for model papers or previous papers of ISTQB certification exam foundation level
is embeded technology is necessary for every electronics engineer?
How do I run chkdsk at startup?
Define the term Column Families?
What is the font style?
What does innodb stand for?
What are the latest versions of css?
Is ruby a dying language?
Explain the jsp life cycle?
What is private key cryptography and how we compare it with public key cryptography?
What is a memory leak in C++?
Main advantage of auto transformer over two windings transformer is that A it needs no cooling B it uses only one winding C core losses are reduced D it has simple construction
how to restrict the users to see the payroll data employee wise, they only can setup the basic elements and pay bonuses but cannot see the gross salaries of employees?