Hi experts, Please tell me how Stock transfer Order Process, Third Party process, Individual Purchase Order Process and credit Management goes on before implementation of SAP.Now-a-days most of the companies are asking about the business processes goes on before implementation of sap.
1 5543Hi! all, in SAP SD, I'm creating a customer in Tcode: XD01 & Im able to save the Customer & an Number is assigned for the following Customer through the Internal Number that has been assigned to the relevant Account Group. Everything is going fine till I the system generates the Customer Number. But when I check for the same Customer Number in XD02 / XD03, I get an Error saying that - "The Customer doesn't exist or not created". I have checked the Number Ranges & they are perfectly assigning the number sequence but I'm unable to retrieve the Customer info from the CMR. The Customer created is also not visible in the Tcode: VCUST. Could anyone help me resolve this particular issue, at the earliest please.
3 9535Order types, why do we need to create our order types and not use the standard ones during implementation.
1 6002If there are 11 versions of a mapping and if you want to keep the latest version and delete the remaining versions .. how do you do it?
2317I have one sales organisation and one plant two customers are mumbai and singapor how to delivery in these scenario?
1 8922Hi, I don't understand what is use of GAP Analysis in Business Process. Plz send me all the details of GAP Analysis Document and its related examples. Regards, Ashok Mail ID: sahooashok08@gmail.com
2 7192After creating invoice that accounting document not generated also system want allow to send output to customer how can we configure?
4 10169What are the requirement you have gathered from your client and what type of business process your client had?
1 3444Post New HP Interview Questions
What is reliability?
what is the include program name?
Why is label used in html?
Write a program to convert all strings in list to integers?
Highlight four principal dangers that are deemed to be security threats to information systems.answers should include a detailed explanation as to how the threat is a danger to the security of an IS. b. identify 6 software control that can be implemented so as to safeguard information system to ensure that dey perform according to management standards. c. For each software control describe how it safeguard and information system.
Is drupal java based?
What is the difference between a data mart and a data warehouse?
What are sql commands?
What is lease financing?
What is oo function testing?
How to test lightning Arrester?
How is RSA used for encryption in practice?
What are Non Action methods in ASP.Net MVC?
what are the roles of an xi architect?
What is function (in details) room sensor and tube or coil sensor in HVAC system?