Write a procedure to return the month and the number of developers joined in each month (cursor )
2 9634RAM one table colums a1,a2,a3,a4 respective values 2,4,7,8 KRISH one table colums a1,a2,a3,a4 respective values 3,4,6,9 IN RAM & KRISH a4 column if comparing values RAM A4 - KRISH A4 ( 8-9 =1 THEN print 5 or (RAM) a4 value 10 KRISH a4 values 2 then 10 -2 =8 print 5*8=40 or diff 5 print same
1 3452i have 2 tables 4 colums table 1 respective values a1 6, a2 8,a3 9,a4 14 & table 2 respective values a1 6, a2 8, a3 9, a4 12. if compare 2 tables 3 colums values same then 4th column values 1)Qes diff >5 then (5 * diff value ) 2)Qes diff <5 the 5 3)Qes diff 5 then 5 print respective values..
2133How to create a custom T-code tell me the procedure How to add an authorization object for that custom t-code If any authorization object has been modified in SU24, how it will be effected in the system? If u has issue like add one AO in 50 roles what would u do? (If all 50 are single roles)? What is rule? What kind of reports does perform at the R3 level?
2 13676If any machinery or transmission needs periodic and regular lubrication what is the best method to give it?
2 29306Practice 1: Changes to data will only be allowed on tables during normal office hours of 8.45 in the morning until 5.30 in the afternoon, MONDAY through FRIDAY. A. Create a procedure called SECURE_DML that prevents the DML statement from executing outside of normal office hours, returning the message: “you may only make changes during normal office hours” b. Create a statement trigger on the PRODUCT table which calls the above procedure. c. Test it by inserting a new record in the PRODUCT table.
1 11772Most memorable Moment....My Name is Shakeel Ahmed I want Good Answer In ths Topic ...& I want Good & Latest Call Centre Interview Questions Answers Latest Pla Rep me ASAP...
2 6522Post New Tech Mahindra Interview Questions
What is hard disk and its purpose?
Name some of the functions in php.
List out the available drill modes? : sap bobi
What is integer max_value?
What are advantages of .htaccess?
What is history command in linux?
What is a sampling scheme?
How to de-symbolicate crash log?
How will non-supporting browsers handle dhtml?
How will you delete selected rows in a table / alv?
How to allocate memory dynamically for a reference?
Explain about the rdb-open method?
What are the different types of arithmetic operations that can be performed by the 8085 microprocessor? Explain with an example?
1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?
What is time phased Planning?