during client export(scc8),what type of requests are
created,customizing or workbench?
Answer Posted / ramanji436
As I know we are creating workbench request.
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is the use of Trusted system? I know that there is no need of UID and PWD to communicate with partner system. In what situation it is good to go for Trusted system?
How to check CPU usage in EP? If java path is down the how to do trouble shoot? What is the transport group? What is the SLD system in PI? How to take back up in EP? How to create logical system? Is it possible to change the name logical system in SSC4? How you will take the online Backup and incremental Backup? What is the backup strategy? How many application servers you have in Production System? Difference between oracle 9i and oracle 10g? What is EHP4? What is your enhancement package and support package? how to find RAM size on Unix? How to find OS level at command Prompt? While doing kernel upgrade what is exe files? What is client comparison? How to apply job on Os level? What are the recent challenges faced? How to apply support package in solution manager? Difference between SPDD/SPAU If SAP* is not working ? If job is slow? how you will trouble shoot? What are software files required for SAP 4.7?
How you will give new authorizations?
How would you troubleshoot the 'system seems slow'?
What is heterogenous system copy and homogenous system copy ?
Explain what are the functional modules used in sequence in bdc?
what are the pros and cons of auto extend of table spaces?
Explain the system log?
In what ways you would know whether a system is unicode or non-unicode?
Explain deletion flag. Where is it used in archiving process?
Can any one tell me , what is the role of SAP Security Admin in BW Security and APO Security ?
describe how to setup a printer in SAP or where they would look to research why a user/users can not print?
How to add authorizations, how you will maintain profiles?
Have you done any up gradations?
What is your organization’s security philosophy? What level of security does your data require? How much risk are you willing to assume in each application area?