1.
Which of the following statements with relations to client copy are correct?
(2 correct answers)
Correct Answer(s)
A. SCC4 can be used from any client
D. Before actual copy resource check and simulation can be done during test run
Explanation
SCC4 can be used from any client because it is a transaction code used to maintain client-specific settings and can be accessed from any client. Before the actual copy, resource check and simulation can be done during the test run to ensure that the client copy process will be successful and to identify any potential issues or conflicts.
2.
When a client is created,
(3 correct answers)
Correct Answer(s)
A. It has to be kept open
B. It has no information
C. It has no users except for a kernel built user
Explanation
When a client is created, it has to be kept open, meaning it remains active and accessible. It has no information, indicating that it is empty and does not contain any data or settings. Additionally, it has no users except for a kernel built user, suggesting that there are no additional user accounts or profiles associated with the client. The new client will not be visible cross client, implying that it is not visible or accessible to other clients or systems.
3.
The t-code used to see the log after a client copy is _______
Correct Answer
B. SCC3
Explanation
The t-code SCC3 is used to see the log after a client copy.
4.
During local client copy, RFC connections must be created between source and target clients.
Correct Answer
B. False
Explanation
During local client copy, RFC connections do not need to be created between the source and target clients. Local client copy is a process that copies data and settings from one client to another within the same system. It does not require network connections or Remote Function Call (RFC) connections. Therefore, the correct answer is False.
5.
Which of the following answers is correct with relation to the t-code SCCL?
Correct Answer
C. It has to be executed in the target client
Explanation
The correct answer is "It has to be executed in the target client." The t-code SCCL is specific to a target client and must be executed in that particular client.
6.
Which of the following commands can be used to check background jobs?
Correct Answer
B. SM37
Explanation
The command "SM37" can be used to check background jobs. This command allows users to view and monitor the status of background jobs in the system. It provides information such as job name, status, start time, end time, and any error messages associated with the job. By using this command, users can easily track and manage background jobs in the system.
7.
During client copy,
(2 correct answers)
Correct Answer(s)
A. No one can login to target client
D. You can login to source client but objects cannot be changed in the source client
Explanation
During a client copy, the target client is not accessible for login, meaning that no one can log in to the target client. However, it is still possible to log in to the source client. Although you can log in to the source client, any changes or modifications to objects in the source client are not allowed during the client copy process.
8.
During the client copy setup process which of the following has a default value by default?
Correct Answer
A. Target client
Explanation
During the client copy setup process, the "Target client" has a default value by default. This means that if no specific value is provided, the system will automatically set the target client as the default value.
9.
BD54 and SALE can be used to,
Correct Answer
D. Create logical systems
Explanation
BD54 and SALE can be used to create logical systems. BD54 is specifically used for creating logical systems, while SALE can also be used to sell products. However, the main purpose of both BD54 and SALE in this context is to create logical systems. Deleting a client is not mentioned as a function of either BD54 or SALE.
10.
Before creating a client the mode has to be changed from Display to Change in t-code SCC9.
Correct Answer
B. False
Explanation
The statement is false because in order to create a client, the mode does not need to be changed from Display to Change in t-code SCC9. The mode in SCC9 is used to display or change the client copy settings, but it is not a prerequisite for creating a client.
11.
A client in an SAP system is,
Correct Answer
B. Business entity
Explanation
In an SAP system, a client refers to a business entity. It represents a separate unit within the system that has its own set of data, configuration settings, and processes. Each client operates independently and can have its own customers, vendors, and organizational structure. Therefore, the correct answer is "business entity" as it accurately describes the role and functionality of a client in an SAP system.
12.
Naming convention of a logical system is,
Correct Answer
A. (SID)CLNT(clientno)
Explanation
The correct answer is (SID)CLNT(clientno). This naming convention follows the format of including the system ID (SID) followed by the client number (CLNT) and then the specific client number within parentheses. This format helps to identify and differentiate the logical systems in a clear and organized manner.
13.
Which of the following are correct with relation to SAP instances and SAP clients?
Correct Answer
C. We can login to the same client trough different instances
Explanation
The given answer states that we can log in to the same client through different instances. This means that multiple instances can be connected to a single client, allowing users to access the same client from different instances. This is a correct statement as it highlights the flexibility and scalability of SAP systems, where multiple instances can be set up to distribute workload or provide redundancy while still accessing the same client.
14.
To copy all client-specific data without changing documents, which of the following profile has to be selected?
Correct Answer
D. SAP_ALL
Explanation
To copy all client-specific data without changing documents, the profile that needs to be selected is SAP_ALL. This profile includes all the necessary authorizations and permissions to access and copy all client-specific data. It ensures that all the required data is copied accurately without any modifications to the documents.