Which default value do the Job Code table and Location table have in common?
Which three statements describe the benefits of using tableset sharing in the PeopleSoft system?
A, C, F
On the Job Data Work Location tab for a new hire, Company is a required field.
You can default Company from the _____ table.
View the Exhibits.
Your client wants to set up a new department called ABC Headquarter for their newly acquired
company ABC. The client shares the department and location information cross all business units.
The HR Administrator has checked that the location code ABCHQ showed up under the Location
Table Search Result page under SetID "Share". However, when she tried to attach this location code
to the new department she is trying to create, she got the error message.
Which two setups may have caused the error message to be displayed? (Choose two.)
Your client is implementing PeopleSoft HRMS system with Payroll Interface. The client is to start
configuring Pay Group table.
What table value should exist in the system before configuring Pay Groups?
Which PeopleSoft table do you use to identify a group of employees who share common pay
You are at your client site working on PeopleSoft HRMS implementation. One of your tasks is to add
systemwide defaults in order to save time when a user is entering information in transaction tables.
Identify which field is NOT a default option in the Org Default by Permission List component.
Your organization has decided to use a department security tree for Row-Level security in PeopleSoft
You decided to use the XYZ permission list to secure data using the Security by Department Tree
Which step do you need to perform to ensure that Row-Level security is enforced?
Using a Permission List associated with a user and identifying security sets and access types in the
Security by Permission List component of PeopleSoft are known as _____.
Your organization has decided to implement row-level security. You suggested securing data by
associating the company with people having jobs. This method of securing data is known as _____.