Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
2 16515Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?
2 14404Q5) What is the procedure you follow in your company as a security admin when a end user complains that he is unable to perform or execute an action in a particular tcode?
2 9310Q6) When do you get a screen for " maintaining the authorization values for org elements " in PFCG ??? (i.e..screen you get thru PFCG --> AUTHORIZATION tab --> CHANGE AUTHORIZATION DATA --> SCREEN FOR MAINTAINING ORG ELEMENT VALUES )
3 8833In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function?
4 16112Post New HP SAP Security Interview Questions
what is maximum number of arrays allowed in rpg?
Why google adwords is important to your business?
What is object/relational mapping metadata?
Why would nosql be better than using a sql database? And how much better is it?
What is one way operation?
Define a validation rule?
Does Disconnect and Connect creates page lock in IDMS ?
How do you stop weblogic using the command line?
What are non action methods in mvc?
How do I make wordpress https?
Is visual basic easy?
how we change 0.1N KmNo4 solution to 0.01N KmNo4 solution.
Why namespace is used in php?
How much fuel is to be burn for production of 1 ton steam?
What is the use of function Proc summary?