which ticketing tool you are using?18 41611
What are the authorization objects which are always present in user master record?1 8467
how we Created over 120 customized end user roles and menus.1 1677
What is meant by t-code lock ? Please explain the actual background process when a user try to access a locked t- code ? What happens inbackground when someone locks a t- code ?3 8093
Whay can't you assign a composite role to another composite role ? Need clear explaintion.3 14379
What is the impact of changing the SU24 objects for a t- code Check ndicator from "No" to "Yes" and "Yes" to "No" ?13 17726
How can you find all t-codes which are locked in the system ?5 10332
How to restrict Table access in SAP?3 15623
How to find list of roles which are not assigned to any user1 4367
Tell me about the license types and what kind of users need to be assigned to these license types1 2385
Blake is focused on branding and is more interested in his ads being viewed than in generating clicks. Which of these features would not be a good fit for him?
What scheme does the Kernel in Unix System V follow while choosing a swap device among the multiple swap devices?
How can you insert a node in a random location of the linked list?
What is the protocol used in Network layer?
What is exactly obj-browse and obj-list(why it is deprecated)?
Explain how we can retrieve the data in the result set of mysql using php?
Can s3 be cast-off with ec2 instances, in case of “yes” please specify how?
How to Close popup menu in system tray application ?
What is the return value of the insertion operator?
In swift what is use of backticks while declaring a variable?
Tell me what is the difference between xrange and range?
List some functions to create objects in the universe? : bo designer
Is it possible that a workflow call itself in data services job?
How to convert numeric values to character strings?
What are the added features in 3.x for multi provider?