which ticketing tool you are using?18 46859
What are the authorization objects which are always present in user master record?1 9144
how we Created over 120 customized end user roles and menus.1 2236
What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?3 8943
Whay can't you assign a composite role to another composite role ? Need clear explaintion.3 15557
What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?13 20475
How can you find all t-codes which are locked in the system ?5 11416
How to restrict Table access in SAP?3 17583
How to find list of roles which are not assigned to any user1 4920
Tell me about the license types and what kind of users need to be assigned to these license types1 2950
What is taglibs?
Compare and contrast between the System.Array.CopyTo() and Clone()?
Explain how your are handling errors?
What is the disease caused by cryptosporidium parvum?
How to replace perl array elements?
What is the purpose of dll files?
How the over load setting for HT Motors calculated-provided in Numerical Relay
What sized websites have you worked on in the past?
what is cbt in bank explain it???
What is dependency injection(ioc) in spring?
Which is the parent class of deque
Is it safe to delete windows old?
Explain the difference between mapreduce engine and hdfs cluster?
What are the Service Model in Cloud Computing?