Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What's the basic difference in between SU22 & SU24?

Answer Posted / yuvan sankar

Basic: usually the sap standard tables USOBX and USOBT are
not allowed modifications so that we copy the customized
tables from these tables so in order to copy the tables we
need to go the transaction su25.
Difference:
su22 displays and update the values in standard tables
USOBT,USOBX.
su24 displays and update the values in customizing tables
usobt_c,usobx_c.

Is This Answer Correct ?    10 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Provides online GRC10 online training,covers configuration & suuport activities on all the four components. ARA,ARM,EAM,BRM. SAP Securty covers--R3 Security,BW BI Security,HR Security,SRM Security,CRM Security Practicals on each component in GRC Provides documentation and notes on each component supports resume preparation and certification For more details contact 8499995600.

2631


How to find ECC system, GRC system and BI system ?

1273


How we schedule and administering background jobs?

1196


Can you explain snc in sap security?

1223


Please also send me details about CRM 5 and CRM 7 security issues and scenarios.

2712


What does the account assessment category specify in a purchasing document in SAP Materials Management?

1419


How do we test security systems.

1152


Give an example of SOD with object level control & also decide the Risk implication from the Technical standpoint.

4771


You want to remove a developer's and developer keys from a system. How would you do that?

1142


What are some ap security t codes?

1221


What is the difference between c (check) and u (unmaintained)?

1949


What authorization are required to create and maintain user master records?

1195


Explain document transfer-level security?

1180


how to do Reporting and Analysis authorizations

2531


What is the difference between authorization object and authorization object class?

1178