Answer Posted / naveen
Archive logs
redo logs
Online Redo logs
Offline redo logs
-------------
Alert logs -> check the oracle system logs
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What is a background processing batch scheduler?
What are the activities you done in PI?
I want to let sap skip printing cover pages during printing for any kind of report. How can this be done?
1)Have you used performance tuning? What major steps will you use for these? 2)In production what is the user exit? 3)What type of user exits have you written? 4)Difference between Search Helps and Match Codes 5)On which even we can validate the input fields in module progams? 6)what are the table controls in BDC ? 7)what is the difference between bdc and lsmw ? 8) If the scripts are client dependent, what above driver program ? (client dependent / independent) 9). I have two pages, In one page I want address, Header, Main & footer. In the second page I want only Main. How to do it? 10) Will 50,000 records be uploaded directly into APP's Server? 11) What is the button to change the variant in ALV ? 12) If your project is support project ? when is your implementation has completed ? 13)In start of selection, if we perform validation, what happens ? 12)How to join 3 tallies & looping. We have developed a program in a client say (200- client) and 210 has test data. No developing rights. How to test data? 13)How to transfer data which is coming from are report as output to another report 14)How to create standard text and how do u transfer it ? 15)What are the views when we are creating Material ?
What will happen during the export process?
Where will u find transport error logs?
Which transaction do you use to check buffer statistics ?
How you will get help from OSS notes?
What are the different modules of SAP?
What do you understand by transport management in sap basis?
What is the use of kernel in sap system? How do you check the current kernel version in sap system?
What is password policy?
What is MySAP?
What is your organization’s security philosophy? What level of security does your data require? How much risk are you willing to assume in each application area?
How to perform the transport?