Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What is meant by t-code lock ? Please explain the actual
background process when a user try to access a locked t-
code ? What happens inbackground when someone locks a t-
code ?

Answer Posted / raghuram

when ever user executed a transaction in background it will
check for that particular transaction from TSTC table if it
is locked it will show the error message particular
transaction is locked

Is This Answer Correct ?    1 Yes 1 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What every changes done exist role in development system that changes are not reflected in quality system, but transport is successfully moved?

1552


what is the different b/w su10 and su12

3028


what is your ticketing tool? can we give some details about how we are getting tickets

1663


How to do SAP R/3 Security configuration, design, development, testing, implementation and production support.

2694


Please let me know if there any vacancies for 3 years of Experienced level in SAP Security

1361


What is stad?

1218


Explain protecting public keys?

1342


List the various user types.

1118


how we Designed security solution for FI, FM, MM, QM, PM, PS, HR (Time Entry, Travel) modules

2498


User is not there in User master record. Then how to trace the user?

1513


What are the steps involved in SAP Security upgradation projects and also in SAP security impletation projects

2871


You want to remove a developer's and developer keys from a system. How would you do that?

1145


What is use of derived roles?

1302


What is the use of tmssup* rfc destinations?

2691


how we Restrict the auth groups for table maintain, creating Auth group using SE54 to built new Auth groups to restrict tables via auth object S_TABU_DIS

2384