Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
How are the function code handles in Flow Logic?
When the User selects a function in a transaction, the system copies the function code into a specially designated work field known as OK_CODE. This field is Global in ABAP/4 Module Pool. The OK_CODE can then be evaluated in the corresponding PAI module. The function code is always passed in exactly the similar way, regardless of Whether it comes from a screen's pushbutton, a menu Option, function key or other GUI element.
Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this representation? Explain it by example(s)?
At a shop of marbles, packs of marbles are prepared. Packets are named A, B, C, D, E …….. All packets are kept in a VERTICAL SHELF in random order. Any numbers of packets with thes
Relocatable programs? Ans. Relocatable programs can be loaded almost anywhere inside the memory.
Q. Show a string in assembly language? MOV AH, 09H MOV DX, OFFSET BUFF INT 21H Here data in input buffer stored in data segment is intended to be displayed on mo
Differentiate between Gateways and Bridges. A machine that connects a LAN to the Internet is termed as a gateway. The gateway machine is responsible for routing packets that ar
Data phases: After the address phase (particularly, starting with the cycle that DEVSEL# goes low) comes a burst of one or more data phases. In all the cases, initiator drives
The Transaction object is responsible for reading the transaction file, finding the relevant account in the array of customers and applying the transaction. To find the relevant ac
What are interrupts? Interrupt: An interrupt is a hardware mechanism which enables an external device, classically input/output devices, to send a signal to the CPU. An int
There are two different parts of applets. Trusted Applets and Untrusted applets. Trusted Applets are applets with predefined security and Untrusted Applets are applets without any
Explain the term- Looking at existing paperwork This allows analyst to see how paper files are kept and look at operating instructions and check accounts, training manuals etc
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd