Q1) What is the difference between Derived Role & Copy Role? Can't we just do a copy instead of deriving it when both have the same characterstics or inputs or functions??
2 16526Q3) What is difference between R/3 security and HR security? Explain in detail or its importance?
2 14414Q5) What is the procedure you follow in your company as a security admin when a end user complains that he is unable to perform or execute an action in a particular tcode?
2 9318Q6) When do you get a screen for " maintaining the authorization values for org elements " in PFCG ??? (i.e..screen you get thru PFCG --> AUTHORIZATION tab --> CHANGE AUTHORIZATION DATA --> SCREEN FOR MAINTAINING ORG ELEMENT VALUES )
3 8851In su24, what will happen if i have maintain ' Do not check ' check indicator?(auth. check for auth. object is maintained in program) is that mean user can execute concern object function?
4 16128Post New HP SAP Security Interview Questions
Which are the common ways of communication between modules of your application, using core angularjs functionality?
What does truncate table do?
What is variable dbms?
What is distributed system in asp.net?
How many websites can you have on wordpress?
What is the difference between spark and hive?
What is google hummingbird algorithms?
To generate supply network planning pds data, what should be pds type? : supply chain management
Explain the types Of Znodes?
what media object in Bootstrap is and what are their types?
Explain briefly about processor and its functioning?
what are termination roles of an element?
how to create “alternate row colour”?
what is Voltage levels of rs232x?
How to avoid fly ash seed ball formations in the concrete mixer while mixing of raw materials for fly ash block manufacturing?