Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Software Interview Questions
Questions Answers Views Company eMail

how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

IBM,

2448

how we Created over 120 customized end user roles and menus.

IBM, Wipro,

1 4388

how we Set up Central User Administration (CUA) to manage 4 systems/clients

IBM,

2304

how we do CUA configuration in Quality system

IBM,

2436

How we Educated client personnel in R/3 Security and general Basis knowledge

IBM,

2274

How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)

IBM,

2248

How we Provided Security design, configuration, and support for SAP Enterprise Portals

IBM,

2235

how to do Assigning authorization groups for table restrictions and program restrictions.

IBM,

1 6245

how to do Reporting and Analysis authorizations

IBM,

2464

how to do Restricting nodes and Hierarchies through characteristic values and authorization objects

IBM,

2347

how to we Assigning Portal groups for Business users in BI

IBM,

1 3479

what is the difference between BI AND BW security

IBM,

2 16501

How we do Scheduled jobs in background to cleanup spool request, dumps

IBM,

2 8129

how we Set up profile parameters and security Audit log activation

IBM,

3 8709

how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

IBM,

2156


Un-Answered Questions { Software }

Which is better winforms or wpf?

157


What web services does Joomla Support?

116


How does router work in rails?

891


Why gii is used?

3


What companies are using angular?

735


What would you say to your boss if he?s crazy about an idea, but you think it stinks?

2866


How do I split one cell in excel?

687


What are the uses of interactive reporting?

1089


In JCl , we have COND parameter.This holds comparison code and condition.It also has only and even parameters. ex: COND((4,GE),EVEN).what the comma mean here. is that 'and' or 'or'.

2268


What is symbolic url in siebel?

1106


Can you please suggest the type of keywords?

863


Explain the block in drupal?

113


What is the directory structure in ember.js?

5


What is the Frame Format ?

1396


An array having 100 elements have numbers from 1 to 99 randomly out of which any number is repeated. Find the repeated number in minimum time and space complexity.

1171