What does below stand for?
SAP
ERP
ECC
ABAP
BASIS
Answer Posted / narendra
BASIS-business application software integrated solution
| Is This Answer Correct ? | 8 Yes | 4 No |
Post New Answer View All Answers
What are the different types of sap security tables?
Explain protecting public keys?
what is user buffer?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
how we Custom Authorization Objects and Custom Transaction maintenance and how we do User classification, Running systems measurement reports during license auditing through USMM and SLAW
What is the difference between c (check) and u (unmaintained)?
You wan to transport user groups from transaction sugr? Would this impact the groups tab in su01? What would you do?
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation
How to update risk id in rule set?
Can you explain internet-level security?
Please also send me details about CRM 5 and CRM 7 security issues and scenarios.
Differentiate between derived role and composite role
the company needs to expand its region to another country which the same authorizations had previously what approach you will take
Is it possible to have more than one st of org-level values in one role? Explain your answer.
What are some ap security t codes?