Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
2 16382How to create a custom T-code tell me the procedure How to add an authorization object for that custom t-code If any authorization object has been modified in SU24, how it will be effected in the system? If u has issue like add one AO in 50 roles what would u do? (If all 50 are single roles)? What is rule? What kind of reports does perform at the R3 level?
2 13569What is the latest change that was done to the SU53 trace, which is used to find the last authorization failure in SAP..???
4 17056does composit role has autherisations,how to we add the org values in composit role,What is the max authorizations objects that can be assigned to a profile
4 7323Post New Tech Mahindra SAP Security Interview Questions
Explain about dos attack in bluetooth?
How can data pipelines be adapted for LLM applications?
What language does mysql use?
what is the meaning of vcc
to update a batch in a table in jdbc which method of statement object is used
How to achieve Polymorphism in VB.Net?
what is the difference between software testing and quality testing? how do they vary,waht is the process of testing in both software and quality?
a private address 172.116.0.0 will borrow ? bits from the HOST to give one 120 subnets - range = ?
What is 19 null in sql?
what is the difference between String and Symbol?
Explain shallow copy?
With what commands you can Delete a directory and all the directories with files?
What are the types of line styles available in Treeview Control?
Explain thread.
How do you split a cell into two in excel?