Doubt about select performance and keys in Select.

Hi Gurus.
I need select data from VBAK with key Vbeln (VBFA has value then i can use your vbelv i think)  then with VBAK-BSTNK and VBAK-KUNNR i goin to select data from KNA1 , only field ADRNR , then i going to ADRC table with field ADRNR  like key, then i could select CITY1, STREET, HOUSE_NUM1, HOUSE_NUM2, CITY2, POST_CODE1 e CITY1.
1- I know that tables has many data then i need advices for a good performance. suggests is welcome.
2- If i write any thing wrong please tell me .
3-If anybody know any key that i don´t write please tell me.
4-If anybody know other way .suggests is welcome.
Thanks comunitty for help.

Hi Ronaldo,
It seems you have everything you need. You have primary keys for VBAK, KNA1 and ADRC, so the best option in my opinion is one select from vbak inner join KNA1. As fopr ADRC it may be tricy because of the date from / to, so this might be worth going FAE. But test both posibilities before settling for one.  I don't know why you need BSTNK though
By the way, this I assume you are writing a report? cause if you only need one record at a time I suggest you use BAPIs for customer/address.
Cheers,
Custodio

Similar Messages

  • About value type and key figure type

    Hello Gurus,
              please explan the different usage of about value type and key figure type.  what is the typical values for both infoobjects ?
    Many thanks,
    Frank

    Hi,
    0METYPE is a key figure-specific info object usually used to define semantics of the individual business key figures in BW (for example, actual, commitment, plan, target values).
    Its a bi specific field which is filled from extract structure field named MEASTYPE table COSR
    Refer to OSS Note 523742 for how it is filled and the following link for additiona information.
    http://help.sap.com/saphelp_nw70/helpdata/en/91/ddd52b9ef30645a338e28aae443807/frameset.htm
    Note 523742 - BCT-CO: BW key figure model and R/3 tables for trans. data
    This note provides information on the key figure model in the area of BW Content CO-OM. It also gives an overview of the DataSources for transaction data and the corresponding source tables and value fields in the R/3 System.
    The key figure model for currency fields in the area of CO-OM contents affects the following info object of type key figure:
    0AMOUNT Amount
    The key figure itself does have any business semantics.
    The semantics of the individual business key figures in BW (for example, actual, commitment, plan, target values) is determined using combinations of values for the following key figure-specific info objects (see also the account model in SEM-BPS, note 407563):
    0METYPE Key figure type
    0VTYPE Value type for reporting
    --> 0VTDETL Details of the value type
    --> 0VTSTAT Statistics indicator for the value type.
    For example, using transaction SE16, the possible characteristics of the values of this InfoObject can be taken from the above-mentioned master data tables in R/3.
    The business key figures on the InfoCubes of the standard BW content were defined as restricted key figures using this semantics of the key-figure-specific characteristics.
    The conversion of the R/3 transaction data in the BW key figure model is carried out in the extractors using the ROMI_GET_VTYPE_AND_DETAIL function module. It primarily happens using the specified conversion tables.
    The following dependencies exist for the source tables of the DataSources:
    COSP_VTYPE for COSS, COSP, COVP,
    COSB_VTYPE for COSB,
    BPXX_VTYPE for BPGE, BPJA, BPEE
    If an R/3 source record cannot be converted using these tables, it may not be extracted to BW.The application log of the R/3 DataSource transaction RSA3 contains entries for the unconverted values after the test run.(The log function for the CO-OM DataSources was considerably improved by the correction for note 523655).
    The application log for the extraction runs from BW can be evaluated using transaction SLG1 (Object: RSAP, object information: RSAP_INFO)
    Furthermore, the semantics of a key figure are still determined by the time characteristics and the following key-figure-specific info objects:
    0CURTYPE Currency type (for more information, see note 517909),
    0DB_CR_IND Debit/credit indicator (for more information, see note 065075),
    0VERSION CO version
    -Vikram

  • Display key in the selection screen and Key & Text in the report

    Hi,
    For the infoobject in the query,
    In the variable selection screen When i want to select any value it should display only key, and in the report i want to display key and text of that infoobject.
    Is it possible?
    Thanks
    Rani

    Hi
    Display As
    Here you determine whether and in what format the individual characteristic values of the characteristic are presented:
    ·        (Standard): The standard display type for characteristic values corresponds to the setting in InfoObject maintenance under Tab Page: Business Explorer.
    ·        No Display: The characteristic display is hidden. This function is useful, for example, with the currency/unit characteristic as the currencies are also shown in the key figures.
    ·        Key and Text: The characteristic values are displayed by their technical key and text.
    ·        Text: The characteristic values are displayed by their text.
    ·        Key: The characteristic values are displayed by their technical key.
    ·        Text and Key: The characteristic values are displayed by their text and technical key.
    In the dropdown box below, you can select the type of text you want to use if you set a display type that contains text. The following options are available:
    ·        Standard: The shortest available text for the characteristic values is used as the text.
    ·        Short text: The short text for the characteristic values is used as the text.
    ·        Long text: The long text for the characteristic values is used as the text.
    ·        Medium text: The medium text for the characteristic values is used as the text.

  • Differences in the object selection order with Select Same and Key Objects

    If you manually select multiple objects using Shift, the first object you select becomes the Key Object for alignments. If you use the Select Similar command, it's the last object. Shouldn't this be uniform between the two methods?

    I have this same issue... HUGE problem and I can't seem to solve it.  Anyone in the same boat?  Solutions?  Thanks in advance for any help!

  • When I click on the "quick selection tool" and try to select something, it just "draws a line"

    When I click on the "quick selection tool" in Photoshop CS5, and try to select something, it just "draws a line" as if the diameter were very thin and it dones't select anything.
    Thanks.

    BOILERPLATE TEXT:
    If you give complete and detailed information about your setup and the issue at hand, such as your platform (Mac or Win), exact versions of your OS, of Photoshop and of Bridge, machine specs, what troubleshooting steps you have taken so far, what error message(s) you receive, if having issues opening raw files also the exact camera make and model that generated them, etc., someone may be able to help you.
    Please read this FAQ for advice on how to ask your questions correctly for quicker and better answers:
    http://forums.adobe.com/thread/419981?tstart=0
    Thanks!

  • How to add Check box to a static Drop down list (bases on a selection list) and allow mulity select in it?

    Dear All,
    I created a text field in my project (Light switch 201, C#), this text field has a static list which I filled manually. when I click in this text box I get a dropp down list which allow me to chose only one value from it.
    Now what I want to do is to add a check box in this drop down list and allow mulity selection from this list. My list looks as follow:
    Can anyone help me :) ? 
    Thanks all,
    Zayed

    Something like this:
    http://www.codeproject.com/Tips/452756/Add-checkbox-inside-combobox-in-Silverlight

  • Doubts about HTTPS requests and Java proxy

    Hello,
    I need help about SSL connections and Java.
    I'm developing a HTTP/S proxy with Java. To test my proxy, I use Firefox. I configure the proxy option in the browser. The proxy works good with HTTP requests, but with HTTPS requests doesn't work and I don't know why.
    I explain the steps that I do for a HTTPS request:
    * The browser sends a CONNECT message to the proxy.
    I check that the proxy receives the CONNECT request correctly.
    * The proxy establish a secure connection with the content server.
    I use an SSLSocket to connect with my content server, and the SSL handshake is succesful.
    * The proxy sends a 200 HTTP response to the client:
    I send
    HTTP/1.0 200 Connection established[CRLF]
    [CRLF]
    to the application client (Firefox)
    * The proxy sends/receive data to/from Firefox/content server
    I have a Socket between Firefox and my proxy, and a SSLSocket between my proxy and my content server. I use two threads to communicate the client and the server.
    Java code:
    //Thead server-->proxy-->application(Firefox)
    ThreadComm tpa = new ThreadComm(bis_serverSSL, bos_app);
    //Thread application(Firefox)-->proxy-->server
    ThreadComm tap = new ThreadComm(bis_app, bos_serverSSL);
    The "tpa" thread reads from the SSLSocket between the proxy and the server and sends data to the Socket between the proxy and Firefox.
    The "tap" thread reads from the Socket between the proxy and Firefox and sends data to the SSLSocket between the proxy and the server.
    This is the class ThreadComm:
    public class ThreadComm extends Thread{
        private BufferedInputStream bis = null;
        private BufferedOutputStream bos = null;
        public ThreadComm(BufferedInputStream bis, BufferedOutputStream bos) {
            this.bis = bis;
            this.bos = bos;
        @Override
        public void run() {
            int b = -1;
            FileOutputStream fos = null;
              do {
                   try {
                        b = bis.read();
                        System.out.print((char) b);
                        fos.write(b);
                        bos.write(b);
                        bos.flush();
                   } catch (Exception ex) {
                        Logger.getLogger(ThreadAplicacionProxy.class.getName()).log(Level.SEVERE, null, ex);
                        //b=-1;
              } while (b != -1);
        }But this doesn't work and I don't know why.      
    I have an Apache server with the mod_ssl enabled as content server, I can send requests (with Firefox) to the port 80(HTTP request) and 443(HTTPS request) without use my proxy and it works. If I use my proxy, HTTP request works but with HTTPS request doesn't work, I look the log of Apache and I see:
    [Tue Apr 27 17:32:03 2010] [info] Initial (No.1) HTTPS request received for child 62 (server localhost:443)
    [Tue Apr 27 17:32:03 2010] [error] [client 127.0.0.1] Invalid method in request \x80\x7f\x01\x03\x01
    [Tue Apr 27 17:32:03 2010] [debug] ssl_engine_kernel.c(1770): OpenSSL: Write: SSL negotiation finished successfully
    [Tue Apr 27 17:32:03 2010] [info] [client 127.0.0.1] Connection closed to child 62 with standard shutdown (server localhost:443)
    Why it say? Invalid method in request \x80\x7f\x01\x03\x01 , my proxy sends the data that the Firefox sends.
    I think than I have follow the explanations of [1] but doesn't work, I have problems in implementation in Java but I don't know where.
    I appreciate any suggestions.
    Thanks for your time.
    [1] http://www.web-cache.com/Writings/Internet-Drafts/draft-luotonen-web-proxy-tunneling-01.txt

    ejp, I have checked the socket between the proxy and server and ... You are right! , I was using the port 80 instead of the 443 (incredible mistake!, I'm sorry). I was convinced that I was using the port 443... Well, is a little step, but I still have not won the war :)
    If I see the log files of Apache, We can see that something goes wrong.
    localhost-access.log
    >
    127.0.0.1 - - [04/May/2010:17:44:48 +0200] "\x 80\x 7f\x01\x03\x01" 501 219
    >
    localhost-error.log
    >
    [Tue May 04 17:44:48 2010] [info] Initial (No.1) HTTPS request received for child 63 (server localhost:443)
    [Tue May 04 17:44:48 2010] [error] [client 127.0.0.1] Invalid method in request \x80\x7f\x01\x03\x01
    [Tue May 04 17:44:48 2010] [debug] ssl_engine_kernel.c(1770): OpenSSL: Write: SSL negotiation finished successfully
    [Tue May 04 17:44:48 2010] [info] [client 127.0.0.1] Connection closed to child 63 with standard shutdown (server localhost:443)
    >
    I think that this happens because Apache receives the data without decrypt, this is the reason because in the log we can see the "Invalid method in request \x80\x7f\x01\x03\x01". This supposition is true?
    ejp, you say that the "Termination is quite tricky." I have changed my code following yours suggestions (using the join and the shutdownOutput) but the threads don't die.
    I explain you what I do:
    (in time 1)
    I launch the thread (threadFirefoxToApache) that reads data from Firefox and sends to Apache.
    I launch the thread (threadApacheToFirefox) that reads data from Apache and sends to Firefox.
    (in time 2)
    threadFirefoxToApache sends the firts data to the server.
    threadApacheToFirefox is waiting that the server says something.
    (in time 3)
    threadFirefoxToApache is waiting that Firefox says something.
    threadApacheToFirefox sends data to Firefox.
    (in time 4)
    threadFirefoxToApache is waiting that Firefox says something.
    threadApacheToFirefox is waiting that Firefox says something.
    and they are waiting... and never finish.
    In time 2, these first data are encrypted. The server receives these data and It doesn't understand. In time 3, the server sends a HTTP response "501 Method Not Implemented", here there is a problem because this data must be encrypt. According to the documentation that I read, the proxy cannot "understand" this data but I can "understand" this data. What's happen?
    Firefox encrypt the data and send to the proxy. This It's correct.
    The proxy encrypt the data another time, because I use the SSLSocket to send the data to the server. Then the server receives the data encrypted two times, when decrypt the data gets the data encrypted one time. And this is the reason why the server doesn't understand the data that sends Firefox. It's correct? May be.
    Then If I want that the server receives the data encrypted one time I need to use the socketToServer, It's correct?
    I will supposed that yes. If I use the socketToServer, the proxy doesn't understand nothing, because the data received from the socketToServer are encrypted (I only see simbols), but the Apache log says that there is a problem with the version? (If I use the socketToServer the threads die)
    >
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 read finished A
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write change cipher spec A
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 write finished A
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_kernel.c(1760): OpenSSL: Loop: SSLv3 flush data
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_kernel.c(1756): OpenSSL: Handshake: done
    [Tue May 04 19:55:42 2010] [info] Connection: Client IP: 127.0.0.1, Protocol: TLSv1, Cipher: RC4-MD5 (128/128 bits)
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_io.c(1817): OpenSSL: read 5/5 bytes from BIO#29bd910 [mem: 29ea0a8] (BIO dump follows)
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_io.c(1750): -------------------------------------------------------------------------
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_io.c(1789): | 0000: 80 7f 01 03 .... |
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_io.c(1793): | 0005 - <SPACES/NULS>
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_io.c(1795): ------------------------------------------------------------------------
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_kernel.c(1770): OpenSSL: Write: SSL negotiation finished successfully
    [Tue May 04 19:55:42 2010] [info] [client 127.0.0.1] SSL library error 1 reading data
    [Tue May 04 19:55:42 2010] [info] SSL Library Error: 336130315 error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number
    [Tue May 04 19:55:42 2010] [debug] ssl_engine_kernel.c(1770): OpenSSL: Write: SSL negotiation finished successfully
    [Tue May 04 19:55:42 2010] [info] [client 127.0.0.1] Connection closed to child 63 with standard shutdown (server localhost:443)
    >
    What option is the correct? I need use the SSLSocketToServer or socketToServer to send/read the data to/from the server?. Use the SSLSocket has sense because the data travel in a secure socket, but use the Socket also has sense because the data are encrypted and they are protected by this encription. It's complicated...

  • Selection criteria and application on selection criteria

    Hi all,
    a)Deletion indicator in pur : Existing report takes values of either blank or ‘x ‘ values on input screen for field –Deletion indicator in purchase. If ‘x’ is chosen, report will show PO item details for only deleted items. If ‘blank’(no values)  is chosen , report shows all POs whether it is deleted or not deleted
    Requirement : Input screen for the above field should have option of selecting
    •     Only deleted items ,
    •     Not deleted items only
    •     Both deleted & not delted items
    How to change existing code(select queries).
    Thanks and Regards.
    Shalem

    Hi.
    I guess you extended AbstractTableModel to represent the data displayed
    by your table.
    If this is the case, then after updating the TableModel with the data
    of the second query, you should call super.fireTableDataChanged().
    This method notifies all the TableModel listeners that the model has
    been changed. One of the registered listeners is the JTable itself,
    and the JTable redraws the table upon receiving the notification.
    The are some other methods which notify listeners of a change in the
    model, they all follow the fireTableXXX format.
    If this is not the problem, provide some more information about the TableModel you are using, and the way you update it with the results of
    the second query.
    Ohad

  • Doubts about the advantages and disadvantages of BEx Analyzer

    Hi people!
    Do you know in specific. What are the advantages and disadvantages of BEx Analyzer?
    and Do you know the limitations and scope of the bex analyzer?
    Talking about the security issue. What kind of resticciones be applied to end-users to control information. Protecting system
    resources and the information that the user uses, not be manipulated.
    I hope you could answer my doubts
    Ramon
    Thanks

    Hi!
    The standard BEx BI 3.x tools, is no longer available with the SAP NetWeaver 7.0 BI tools; however, it is part of the SAP BI add-on installation that, by default, will install the BW 3.x tools along with the newer BI 7.0 tools.
    We want to prevent unauthorized download of data to excel sheets from users who have installed bex analyzer but are not authorized to do that. Certain users only have to access querys from web and shouldn't have to use reports from bex analyzer.
    The only accepted way to access reports for all users is by using web querys published in our intranet. But many users have bex analyzer installed and we don't want that an unauthorized user download data to a excel sheet via bex analyzer.
    I'm testing with one user with this roles, but bex web template and bex analyzer have similiar object authorizations, and i don't know if is possible prevent unauthorized download of data from excel sheets.
    Final users don't access to bex analyzer by rrmx transaction
    Until know i'm testing with this user roles:
    1. ZBW:BEX_WEB:RFC (for web templates)
    S_RFC:
    ACTVT:     16
    RFC_NAME:
    RFC1
    RSBOLAP_BICS
    RSBOLAP_BICS_CONSUMER
    RSBOLAP_BICS_PROVIDER
    RSBOLAP_BICS_PROVIDER_VAR
    RSOBJS_RFC_INTERFACE
    RSRCI_LOCAL_VIEW
    RSWRTEMPLATE
    SDIFRUNTIME
    SYST
    RFC_TYPE:  FUGR
    2. ZBW:BEX:RFC (for Bex Analyzer):
    ACTVT:     16 
    RFC_NAME:
    RSOBJS_RFC_INTERFACE
    RSR_XLS_RFC
    RZX0
    SDIFRUNTIME
    SM02
    SUNI
    SYST
    RFC_TYPE:  FUGR
    please take in count this points:
    1. Prevent unauthorized download of data to excel sheets from users that should have accees only querys from web not bex analyzer (very important this point)=
    2. what are the disadvantages of BEx Analyzer, if only if limited by excel...from other point like performance, workprocess with long runtimes, memory issues, for said something.
    I don't know if i'm going by good way.
    Somebody could help me?
    Ramon

  • Changing logical database DDF select order, and restricting the selection

    HI all,
    I am using logical database DDF for a report.  I would like to do two things:
    1) Change the sort order of records so that when my GET statements are processing, they are bringing the data back in sorted by a field of my choice (such as KNA1-REGIO, or KNB1-BUSAB).
    2) I would like to add KNA1-REGIO and KNB1-BUSAB as fields for selection during the LDB's initial selection, instead of filtering out records during the GET statements. 
    FYI, I did find the field DD_BUSAB in the LDB selection structure which I can use to restrict KNB1-BUSAB.  I am still not sure how to restrict by KNA1-REGIO though.
    Any thoughts?
    Thanks so much,
    L

    Thanks for the reply Shiba.  For that particular problem, the business wants to not have to use the dynamic selection, and just have KNA1-REGIO and KNB1-BUSAB as regular select options.  Like I said as well, I did find DD_BUSAB which I can use for KNB1-BUSAB, but KNA1-REGIO is still a problem. 
    Right now I just use a CHECK statement and filter kna1-regio after the GET kna1 statement.
    Thanks again,
    L

  • Doubt about JAVA stack and ABAP Stack

    Good day!
    Hope can help me with my next doubt. I understood that BI JAVA or JAVA has been embedded in the Java support package stack for portal. But for BI7 the installation for JAVA is by sps. We only use pure support package for BI7, we don't use support package stacks and we don't use JAVA. I'm not sure because i don't made the sap installation in our enterprise, how can i be sure if we have installed java in BI7 and if we don´t have installed, should I install Java in our sap system? what are the benefits and consequences if I decide install it? and what is the difference about BI java (portals) and JAVA stack for BI7?
    I try to find some information but I found some information  about bi Java for portals, but not for BI.
    Ramón Sánchez

    Hai,
    BI-7.0,JAVA:BI-Java is used to provide the Java runtime for scenarios such as Enterprise Reporting, Query, and Analysis as well as Business Planning and Analytical Services.BI-Java requires AS Java and Enterprise Portal Core and EP in the same system. Optionally, you can combin with other usage types in one system. Usually, scenarios running on usage type BI-Java also require usage types BI and AS ABAP. While installing BI-Java, AS Java, EPC and EP get installed automatically. Usually, when running on usage type BI-Java also require usage types BI and AS ABAP, you should be aware that no matter if you run BI and BI-Java in the same or in separate systems, both BI and BI -JAVA should be kept in sync in terms of Support Package Stacks.
    BW 7.0 is now called as BI 7.0. There are many differences between them in areas like extraction, EDW, reporting, analysis administration,etc.,
    http://www.ittestpapers.com/articles/987/2/SAP-BI-70-Features/Page2.html
    Advantage of having Double stack Instance: Where AS ABAP provides the complete technology and infrastructure to run ABAP applications and AS JAVA provides Java Enterprise Edition environment for developing and running Java programs.
    Regards,
    Yoganand.V

  • Doubt about integration CUCM and VoIP Provider

    Hi Guys,
    I have the follow doubt: Is possible to do integration CUCM and VoIP Provider using authentication? Is there necessary another equipment to do this? CUBE for example? or another alternative
    Thanks,
    Wilson

    If you are referring to authentication over sip trunk, then NO! CUCM doesn't do authentication you will need a CUBE for that

  • Doubts about "due date" and "overdue date" configuration

    Hello,
    On transaction FB5LN or FBL1N is possible to view the status of the items, and those statuses are referred to a "Net Due Date Symbol".
    Doubts:
    1) I want to know what is the difference between the "item is overdue" symbol and the "item is due" symbol?
    2) In our company the "due item" if configured as D (today) and the "overdue item" is as D+1 (ie. tomorrow), where can I configure those dates?
    Regards,
    Adriano Cardoso

    Hi
    I don't think you can configure anything to differentiate between Due and overdue. They have a simple English meaning. If an item falls due today based on payment terms, then it is shown "Due" in FBL1n. If the same item is not paid till tomorrow and if you see it tomorrow in FBL1n, it will be shown as "overdue".
    Jayaram

  • Doubt about Rollup Patches and Family Packs

    Hi All,
    What is the difference between Rollup patches and family packs?And also applying family packs will increase the codelvel?Please specify the naming convention of both the pacthes also.
    Thanks
    Rajasekar

    Thanks Kashif M &Hussein for your valuable replies.I've read the links. As per the documennt in r12.
    Product family release update pack (product family RUP)     An aggregation of patches on a given codeline created for all products in specific product family for a specific point release. For example, R12.FIN_PF.A.1.
    Release update pack (RUP)     A cumulative aggregation of product family release update packs on a given codeline created across Oracle E-Business Suite after the initial release. For example, 12.1.1.
    RUP in r12 is similar to family pack(11i) which will change the third digit (12.1.1 to 12.1.2).right?
    Product family release update pack(family pack) with new features called rollup patch?
    (or)
    About rollup patch I read in one apps dba blog
    Rollup patces are usually fixes of all issues popped up because of a particular minipack/familypack or maintenance pack. Lets assume you applied a family pack & because of that some issue/bug came into picture or all bugs reported soon after family pack or maintenance pack are fixed and released as Roll Up patch . These are usually denoted as roll up 1 rollup 2 or roll up A roll up B.
    So you will see maintenance pack 10 (11.5.10) roll up 1 or roll up2.
    How can we identify the roll up level?
    Thanks
    Rajasekar
    Edited by: user9113570 on Jun 5, 2012 8:30 AM

  • Few questions about video performance and more

    Hello there,
    I'm quite sure I want to buy MacBook as my new laptop, but one thing bothers me all the time - for these money I can get a standard PC with larger display and better graphics card.
    In order to clear some confusion, I'm going to ask you a few questions, first of all:
    1. How big is the display resolution in MacBook (13" doesn't seem to be much)?
    2. Is the integrated graphics card enough to play World of Warcraft?
    3. Is it possible to ruin the operating system like Windows?
    4. Do you receive an instalation CD of Mac OS X in case the operating system fails?
    5. Is it possible to install Linux on MacBook?
    That's it, thank you in advance .

    1. How big is the display resolution in MacBook (13"
    doesn't seem to be much)?
    For laptop it's good. I have HP 15.4'' and don't feel big difference.
    2. Is the integrated graphics card enough to play
    World of Warcraft?
    It's OK,but a bit slow.
    3. Is it possible to ruin the operating system like
    Windows?
    yes via Parrallels or Boot cam
    4. Do you receive an instalation CD of Mac OS X in
    case the operating system fails?
    Yes even two

Maybe you are looking for

  • Acrobat 7 Professional - PDF Maker

    I encounter a problem trying to create a PDF from file option in Acrobat, choosing a Word document. It will begin to process the Word document, but then dissappear - no visible dialog within the Acrobat application window. The same thing will happen

  • Websites not displaying properly after reset - Strange horizontal bars across screen.

    Hi all, Recently AVG updated on my PC. I'm normally on the ball with things like this and always prevent the add ons self installing such as free search tools etc but this one slipped past me. The end result was that whenever I opened a new tab AVG h

  • Cannot flag email in shared mailbox

    We have recently moved our mail services from an old Exchange server to the cloud (office365) and one of our shared mailboxes is causing troubles. The users cannot flag the mails anymore (so no-one knows who is doing the follow-up). When flagging a m

  • Bookmarks are not sticking

    I have audio that I record with Audio Hijack Pro and they are saved as AAC bookmarkable. The actual filename ends with .m4a. I am losing the bookmarks. I just tried a test with a real audio book from audible and it did not save the last played locati

  • Server Admin won't connect, ssh will...

    Hi, I am no longer able to connect to my server using Server Admin. It gets stuck on 'loading' for ages and then says the server doesn't exist. I can connect fine with ssh, and there's nothing in system.log or servermgrd.log. I've tried deleting the