1.
On which information does the data access strategy used for exe__ statement depend on? 2 answers
Correct Answer(s)
A. The fields specified in the WHERE clause of the SQL statement
B. The availability of indexes for the queried tables.
Explanation
The data access strategy used for an SQL statement depends on the fields specified in the WHERE clause of the statement and the availability of indexes for the queried tables. The WHERE clause determines which records need to be retrieved, and the indexes help in optimizing the retrieval process by providing a quick lookup mechanism. Therefore, these two factors play a crucial role in determining the data access strategy for an SQL statement.
2.
What are some of the reasons for using the extended memory co___ systems? 3 Correct answers.
Correct Answer(s)
C. Fast context switches are needed in SAP systems because many users share few work processes
D. SAP transactions usually consist of more than one step or screen
E. Extended memory is accessed through pointers; therefore, fast context switches are possible.
Explanation
The reasons for using extended memory in the given question are that fast context switches are needed in SAP systems because many users share few work processes, SAP transactions usually consist of more than one step or screen, and extended memory is accessed through pointers, allowing for fast context switches.
3.
Which elements of total response time should be under 20ms? 2 Correct answers.
Correct Answer(s)
A. Roll-in time.
B. Wait time
Explanation
The elements of total response time that should be under 20ms are roll-in time and wait time. Roll-in time refers to the time it takes for a process or task to be fully integrated and operational, and wait time refers to the time a user has to wait for a response or action to be completed. Keeping these two elements under 20ms ensures that the overall response time is fast and efficient for users.
4.
Which of the following reports or transactions can be used to monitor memory consumption? 2 Correct answers
Correct Answer(s)
A. Report RSMEMORY
B. Transaction ST02
Explanation
The correct answer is Report RSMEMORY and Transaction ST02. The RSMEMORY report can be used to monitor memory consumption in SAP systems. It provides information on various memory areas such as shared memory, heap memory, and extended memory. Transaction ST02, on the other hand, allows monitoring of buffer and memory usage in the SAP system. It provides detailed information on buffer areas, memory usage, and cache hits. Both of these reports and transactions are useful for monitoring memory consumption in SAP systems.
5.
Which option represents "Generic area buffered"?
Correct Answer
B. You set some of key fields for a table to determine the data to be buffered during access
6.
How can expensive SQL statements cause poor performance of o___. 3 Correct Answers
Correct Answer(s)
A. By displacing many blocks from the database buffer that must be replaced by other processes
B. By causing other processes to wait for the database and / or work processes which are busy
C. By creating a hardware bottleneck on the database server, causing poor database performance for all processes that use the database
Explanation
Expensive SQL statements can cause poor performance because they can displace many blocks from the database buffer, which then need to be replaced by other processes. This can lead to delays and increased wait time for other processes that are trying to access the database. Additionally, these statements can create a hardware bottleneck on the database server, resulting in poor performance for all processes that rely on the database.
7.
You are reviewing RFC data in the transaction Workload Monitor _____ profile provides information about function modules in other systems ____ from this system?
Correct Answer
A. RFC client profile
Explanation
The RFC client profile provides information about function modules in other systems that are called from this system.
8.
Which of the following SQL statement types always bypass the SAP ____? 3 Correct answers
Correct Answer(s)
A. Native SQL statements
B. Select Distinct statements
C. Select for Update statements
Explanation
The given correct answer is Native SQL statements, Select Distinct statements, and Select for Update statements. These statement types always bypass the SAP ____. This means that these statements are not processed by the SAP system and are executed directly at the database level. Native SQL statements allow direct interaction with the database using specific database syntax. Select Distinct statements retrieve unique values from a column in a table. Select for Update statements lock the selected rows in a table for update or delete operations. Open SQL statements and Select Single statements do not always bypass the SAP ____.
9.
What data is available in transaction Buffer Monitor (ST02)? 2 Correct answers
Correct Answer(s)
A. Status information of buffers of the SAP instance
B. Information on the memory usage of the SAP instance
Explanation
The transaction Buffer Monitor (ST02) provides status information about the buffers of the SAP instance, including details on their usage and performance. It also provides information on the memory usage of the SAP instance, helping administrators monitor and optimize memory usage.
10.
In transaction Work Process Overview (SM50/SM66) you see that ____ processes are in 'PRIV' mode. What should you do to identify the ____? 2 Correct answers
Correct Answer(s)
A. Check the extended memory usage in the transaction Tune Summary Monitor (ST02) and extended memory configuration
B. Check if all work processes in PRIV mode are using the same transaction or report and investigate it further if they are
Explanation
To identify the processes that are in 'PRIV' mode, you should first check the extended memory usage and configuration in the transaction Tune Summary Monitor (ST02). This will help determine if there is any issue with the extended memory that may be causing the processes to be in 'PRIV' mode. Additionally, you should also check if all the work processes in 'PRIV' mode are using the same transaction or report. If they are, further investigation is needed to identify any potential issues with that specific transaction or report.
11.
The function "Execute Explain for SQL Statements" compromises ______. What details can you get from this plan? 2 Correct answers
Correct Answer(s)
A. Estimated costs
B. Estimated rows
Explanation
The function "Execute Explain for SQL Statements" compromises the estimated costs and estimated rows. This means that it provides information about the expected expenses and the number of rows that will be affected by the SQL statements. It does not provide information about the estimated response time or estimated CPU cost.
12.
You suspect that there is an issue with the network connection from the application layer to the presentation layer. Which check do you perform in which transaction?
Correct Answer
A. LAN check by ping in transaction Operating System Monitor (ST06(n))
13.
What percentage is considered a potential resource bottleneck for the CPU?
Correct Answer
A. Below 20% Idle
Explanation
A percentage below 20% idle is considered a potential resource bottleneck for the CPU. This means that if the CPU is consistently utilizing more than 80% of its resources, it may struggle to handle additional tasks efficiently. This can result in slower performance, lag, and potential system crashes. Therefore, it is important to monitor CPU usage and ensure it remains below 20% idle to maintain optimal performance.
14.
What is the SAP Operating System Collector (SAPOSCOL)?
Correct Answer
A. An SAP proprietary standalone program for collecting Operating System usage
information
Explanation
The correct answer is "An SAP proprietary standalone program for collecting Operating System usage information." SAPOSCOL is a program developed by SAP that is used to collect information about the usage of the operating system. It is a standalone program, meaning it can be run independently from other SAP applications. This program is specifically designed for collecting operating system usage information and is not an alternative to the Operating System Monitor for non-ABAP systems or a third-party tool.
15.
Which of the following statements bypass the buffer?
Correct Answer(s)
A. SELECT ... BYPASSING BUFFER
B. SELECT FOR UPDATE
C. SELECT BY DISTINCT
D. ORDER BY (other than the primary key)
E. Any aggregate function (COUNT, MIN, MAX, SUM, AVG), for example SELECT MIN(F1) FROM T1 WHERE...
F. WHERE clause contains IS NULL
G. All native SQL statements
Explanation
All of the given statements bypass the buffer.