generally what types of security problem you will get ?
Answer / swathi
1.user date expire 2.t-code not authorized 3.organization
level not maintain 4.user do't have authorizsation
Is This Answer Correct ? | 2 Yes | 0 No |
What are the prerequisites for adding a data file to a Table space?
how will you delete the spool datas without using rspo0041(tell all the other method}
Why we execute SGEN, which Tables it modifies,will it cause DB growth? is it possible to execute SGEN later on after Golive?
why do we set Java Path in Environmental Variable.
if we execute r3trans -d in command prompt, it will give return code , but where it will generates log file? please tell me the path of the log file.
How to define instances and operation modes?
how can u do kernal upgrade in dual stack?
On a particular system how you can get a list of the users with development access on a particular system?
How the buffers are reset?
Explain transport domain?
What is the state of Processes once it is started?
How we can configure the transport management system.