Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
2 15150Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?
2 13139Q5) What is the procedure you follow in your company as a security admin when a end user complains that he is unable to perform or execute an action in a particular tcode?
2 7693Q6) When do you get a screen for " maintaining the authorization values for org elements " in PFCG ??? (i.e..screen you get thru PFCG --> AUTHORIZATION tab --> CHANGE AUTHORIZATION DATA --> SCREEN FOR MAINTAINING ORG ELEMENT VALUES )
3 7334In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function?
4 14181Post New HP SAP Security Interview Questions
Hi guys, If anyone have gone through the CAPITAL IQ-Junior Research Associate interview then plz let me know about its pattern..and if anyone hav its placement papers or any other information then plz post to me at arshadbasha_mba@rediffmail.com
how do secured fields behave for create or update?
Why reactors use before incoming of ac vvfd drive?
Is there an update statement?
What does strip () do python?
Is the basic list deleted when the new list is created?
What is MPP in Redshift ?
Is it slower if you access a record through alt index as compared to primary index?
How do you know the all indexes available for a collection?
What are the custom tags?
in solaris file sysrm is full what u do?
How do I add aspx page to visual studio?
How to Access HKEY_LOCAL_MACHINE under NT without Admin?
What is meant by web server and servlet?
How long should you spend on a powerpoint slide?