Software Interview Questions
Questions Answers Views Company eMail

What is the parameter in security audit log (sm19) that decides the number of filters?

1 2083

What is a composite role?

802

Which transaction code is used to display the user buffer?

664

How to insert missing authorization?

661

What is the t-code used for locking the transaction from execution?

1 1393

what are the pre-requisites that should be taken before assigning sap_all to a user even there is an approval from authorization controllers?

650

What profile versions?

791

How to create users?

718

Which t-code can be used to delete old security audit logs?

880

What is a derived role?

1 1341

what is the difference between usobt_c and usobx_c?

769

How can I do a mass delete of the roles without deleting the new roles?

842

How many transactions codes can be assigned to a role?

2 1593

What are the types of windows?

541

How do we define text symbols?

512


Un-Answered Questions { Software }

What are the hooks in wordpress?

107


When the constructor of a class is invoked?

580


what is tracing? Where it used?

602


What is session data?

534


Is it possible for the users to convert the package group into a process chain? If so, how?

487






Which file is taken by compiler when we have both file Application and Server Configuration file?

1559


Define cache coherency and how is it eliminated? : Dot net architecture

517


Use of list-tables command in hadoop sqoop?

5


What is meta information in html?

443


What methods $resource service object support?

1204


Describe the two types of formbeans.

569


What is bubble sort in c?

627


How do you stop an app from crashing?

486


How will you explain machine learning into a layperson?

37


Explain what is render array in Drupal?

104