Post New Answer View All Answers
Which transaction should not be given to BASIS and DEV team in Production?
How to assign any program to user?
what is the process to find that one consultant had removed a table from sap tables
What are su22 t-codes used for?
what things you have to take care before executing run system trace?
what is the different b/w su10 and su12
what is use of copy data in derived role and when we use this one ???
what are all the questions covered in "profiles related concepts " please let me know ?
How we schedule and administering background jobs?
what is the use of defaults tab in start menu
How would you do the 'a user logge into production system, changes a table and logged out'. How would you track him?
Can you explain document transfer-level security?
The user wants to create like a time table in BEX but when the open BEX its showing empty screen . in this situation what will u do.. And How will solve u …What r the steps u will take the to solve the solution..
HI FRIENDS... I WANT TO KNOW FEW TICKETS ON SECURITY WITH SOLUTION.
Giving fire call access and extending fire call access by using VIRSA’s VFAT tool? can u brief give the explanation