in Technology by
What are the differences between Personal, Shared and Secured connections?

1 Answer

0 votes
by

A Personal connection is created by one user and cannot be used by other users. The connection details are stored in PDAC.LSI file.

A shared connection can be used by other users through a shared server. The connection details are stored in SDAC.LSI file in the Business Objects installation folder. However one cannot set rights and securities on objects in a shared connection. Neither can a Universe to exported to repository using a shared connection.

A secured connection overcomes these limitations. Through it rights can be set on objects and documents. Universes can be exported to the central repository only through a secured connection. The connection parameters in this case are saved in the CMS.

Related questions

0 votes
    Shared Object Repository and Per-Action Object Repository are the two types of repositories in QTP? What is the default one between these two? What is the extension of it?...
asked Oct 19, 2020 in Technology by JackTerrance
0 votes
0 votes
    _______ include data shared between two more or more nodes in a network. A. Data B. Messages C. Shared fact D. Contracts...
asked Feb 23, 2023 in Technology by JackTerrance
0 votes
    Java Beans are extremely secured? (a) True (b) False I got this question in unit test. Question is taken from ... Beans & JDBC of Java Select the correct answer from above options...
asked Feb 22, 2022 in Education by JackTerrance
0 votes
    A credit card holder knows the importance of his information that all are secured through _________________ Select the correct answer from above options...
asked Dec 1, 2021 in Education by JackTerrance
0 votes
    Java Beans are extremely secured? (a) True (b) False I got this question in unit test. Question ... JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Oct 24, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a secured mail transferring methodology? (a) POP3 (b) SSMTP (c) Mail using PGP ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following OS does not comes under a secured Linux OS list? (a) Qubes OS (b) Tails (c) Tin ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following comes under secured Linux based OS? (a) Ubuntu (b) Fedora (c) Kubuntu (d) Tails I ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Connections to the Internet using a phone line and a modem are called .. connections. (a) Digital (b) Dial-up (c) ... ) Both (b) and © Select the correct answer from above options...
asked Dec 10, 2021 in Education by JackTerrance
0 votes
    If connections are not symmetric then basins of attraction may correspond to? (a) oscillatory regions (b) ... oscillatory or chaotic regions Please answer the above question....
asked Aug 30, 2022 in Education by JackTerrance
0 votes
    ____________ are logical numbers assigned for logical connections. (a) Logical ports (b) Physical ports (c) Networking ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ________________ are required because HTTP uses a lot of diverse TCP connections, so, the web server needs a ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
...