Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

how to get ticket from end user?

Answer Posted / vaishali

Generally a call is made or an email is drafted to the help
desk and ticket is then raised on the client's behalf.
Usually a transact or user's access form is used to raise a
ticket wherein all the details are been filled.

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is use of derived roles?

1244


What are su56 t-codes used for?

1252


What is the difference between the table buffer and the user buffer?

1218


how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW

2336


what is the critical issue u are faced in your previous experience

1935


Differentiate between temp role and copy role

1190


What does the profile generator do?

1120


how we Completely designed and implemented methodology for controlling end user access to plants, cost centers, etc. and how we Applied to both R/3 and BW environments.

2129


What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.

4453


How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?

1043


Differentiate between usobx_c and usobt_c

1154


How to run the daily background job s for virsa violations ? thabks in advance

3650


Hi, Can any one tell me, what is roles and responsibilities for SAP-Security resource in 'Netweaver Identity Management'

2183


how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

2342


authorization issue. We had asssigned company codes 'BUKRS' in range for example 4000-4220 some come company code is working some are not working means in between ranges . could you please post the answer as early as possible.

3192