Taw10 - Week 1 Part 2 Of 2 (Total Of 184 Questions)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Newtonskn
N
Newtonskn
Community Contributor
Quizzes Created: 7 | Total Attempts: 14,720
Questions: 80 | Attempts: 1,787

SettingsSettingsSettings
SAP Quizzes & Trivia

For preparation for SAP ABAP certification. This was taken from another website ( http://www. Esnips. Com/doc/51e277a2-7727-45ee-bc34-a7fdd27b7728/TAW10%20 1-2%20Basics ) where the answers were already provided


Questions and Answers
  • 1. 

    What is the role of the dispatcher

    • A.

      Dispatches tasks to non R3 systems

    • B.

      Controls resources for the R/3 applications

    • C.

      Issues SQL requests to the underlying database

    • D.

      Manages services between R/3 systems

    Correct Answer
    B. Controls resources for the R/3 applications
    Explanation
    The role of the dispatcher is to control resources for the R/3 applications. This means that the dispatcher is responsible for managing and allocating system resources such as memory, CPU, and network bandwidth to ensure optimal performance for the R/3 applications. The dispatcher also handles task scheduling and load balancing, ensuring that tasks are distributed efficiently among the available resources. By controlling and managing these resources, the dispatcher helps to optimize the overall performance and stability of the R/3 applications.

    Rate this question:

  • 2. 

    Which is NOT a valid TYPE definition

    • A.

      Types: t_mytab like lfa1.

    • B.

      Types: t_mytab type lfa1.

    • C.

      Type: t_mytab type lfa1.

    • D.

      Types: t_mytab type lfa1 of standard table.

    Correct Answer(s)
    C. Type: t_mytab type lfa1.
    D. Types: t_mytab type lfa1 of standard table.
  • 3. 

    What statement is used in ABAP programming to check if a user is authorized to perform an action

    • A.

      Check sy-subrc

    • B.

      Check Permission

    • C.

      Authority-Check

    • D.

      Check Authority

    Correct Answer
    C. Authority-Check
    Explanation
    The statement "Authority-Check" is used in ABAP programming to check if a user is authorized to perform a specific action. This statement is commonly used to verify if a user has the necessary permissions or authority to execute a particular task or access certain data. By using "Authority-Check", the program can ensure that only authorized users can perform the desired action, enhancing security and preventing unauthorized access.

    Rate this question:

  • 4. 

    Which field gets set in the calling program if an exception occurs in a function module

    • A.

      Exceptions parameters

    • B.

      Interface parameters

    • C.

      Sy-subrc

    • D.

      Exception integers

    Correct Answer
    C. Sy-subrc
    Explanation
    If an exception occurs in a function module, the field that gets set in the calling program is "sy-subrc". "sy-subrc" is a system field in ABAP programming that stores the return code of the most recently executed statement. If an exception occurs, the value of "sy-subrc" will be set to a non-zero value, indicating that an error has occurred. This allows the calling program to handle the exception appropriately based on the value of "sy-subrc".

    Rate this question:

  • 5. 

    What is the value of result after the following code is executed.  Assume that the user default is set to Fixed Point Arithmetic DATA: result TYPE p DECIMALS 2. Result = '3000.00' * '0.30'.

    • A.

      Result = 900.0000

    • B.

      Result = 9000000

    • C.

      Result = 900.00

    • D.

      Result = 90000.0000

    Correct Answer
    C. Result = 900.00
    Explanation
    The value of the result after the code is executed is 900.00. This is because the code multiplies the value '3000.00' by '0.30', resulting in a product of 900.00.

    Rate this question:

  • 6. 

    What is the result of the following date calculation.  Assume current date is 20001220 Data: Today(8) type C. Today = sy-datum.Today = 10.

    • A.

      20001220

    • B.

      2001210

    • C.

      10001220

    • D.

      10

    Correct Answer
    D. 10
    Explanation
    The result of the date calculation is 10. This is because the current date is assumed to be 20001220, and the variable "Today" is assigned the value of 10. Therefore, the answer is 10.

    Rate this question:

  • 7. 

    Name the layers of the R/3 architecture

    • A.

      Communication

    • B.

      Internet

    • C.

      Application

    • D.

      Database

    • E.

      Presentation

    Correct Answer(s)
    C. Application
    D. Database
    E. Presentation
    Explanation
    The R/3 architecture consists of three layers: the application layer, the database layer, and the presentation layer. The application layer is responsible for executing business processes and logic, while the database layer stores and manages data. The presentation layer handles the user interface and displays information to users. This three-tier architecture ensures separation of concerns and allows for scalability and flexibility in the R/3 system.

    Rate this question:

  • 8. 

    A table passed to a function module can be passed in what manner

    • A.

      By Value

    • B.

      By Exception

    • C.

      By Table

    • D.

      By Header Line

    Correct Answer
    A. By Value
    Explanation
    A table passed to a function module can be passed "By Value" means that a copy of the table is made and passed to the function module. Any changes made to the table within the function module will not affect the original table. This is useful when the function module only needs to read the table and not modify it.

    Rate this question:

  • 9. 

    Which part of the internal table syntax determines how abap accesses the rows of the internal table

    • A.

      Line type

    • B.

      Table type

    • C.

      Key sequence

    • D.

      Uniqueness attribute

    Correct Answer
    B. Table type
    Explanation
    The table type determines how ABAP accesses the rows of the internal table. The table type defines the structure and behavior of the internal table, including the number and type of columns, as well as any constraints or rules that apply to the data stored in the table. By specifying the table type, ABAP knows how to handle the internal table and how to retrieve or manipulate the data stored within it.

    Rate this question:

  • 10. 

    What is the Effect of not Typing Formal parameters in a FORM

    • A.

      No effect

    • B.

      Conversion always occurs

    • C.

      Forms are less flexible and are guaranteed no chance of a run time error

    • D.

      Forms are more flexible but prone to a short dump if conversion does not work

    • E.

      Conversion never occurs

    Correct Answer
    D. Forms are more flexible but prone to a short dump if conversion does not work
    Explanation
    If formal parameters are not typed in a form, it means that the form is more flexible in terms of accepting different types of input. However, this flexibility also makes the form prone to a short dump if the conversion of the input does not work. This means that if the input cannot be successfully converted to the expected type, the form will encounter an error and terminate abruptly. Therefore, not typing formal parameters in a form increases its flexibility but also introduces the risk of a short dump if the conversion fails.

    Rate this question:

  • 11. 

    What is true about trapping errors with the Catch statement

    • A.

      An Endcatch statement is required

    • B.

      A data variable defined with type x must be defined to receive the raised error code

    • C.

      The statement immediately following the CATCH statement is executed in the event of an error trapped by the CATCH statement

    • D.

      A CASE statement can be used to to validate the value of the error class

    Correct Answer
    A. An Endcatch statement is required
    Explanation
    An Endcatch statement is required in order to properly handle and catch errors with the Catch statement. This statement is used to indicate the end of the error trapping block and allows the program to continue executing normally after the error has been caught and handled. Without the Endcatch statement, the error trapping block would not be properly closed and the program may encounter issues or unexpected behavior.

    Rate this question:

  • 12. 

    In what case are optional parameters allowed in the passing of parameters

    • A.

      FORMS

    • B.

      Functions

    • C.

      Both

    • D.

      Neither

    Correct Answer
    B. Functions
    Explanation
    Optional parameters are allowed in the passing of parameters in functions. Functions can have parameters that are optional, meaning they do not need to be provided when calling the function. This allows for flexibility and customization in how the function is used. Optional parameters are defined with a default value, which is used if no value is provided when calling the function. This feature is particularly useful when a function has multiple parameters and some of them are not always necessary to be specified.

    Rate this question:

  • 13. 

    What is the effect of the EXIT statement in the following code: Report ABCData: …..Start-of-Selection.Perform Form A.End-of-Selection.Form A.  Loop at inttab.    ...    Exit.  Endloop.Endform.

    • A.

      Exits the Start-of-Selection Event

    • B.

      Exits the Program

    • C.

      Exits the Loop

    • D.

      Exits the Form

    Correct Answer
    C. Exits the Loop
    Explanation
    The EXIT statement in the code will cause the program to exit the loop.

    Rate this question:

  • 14. 

    An Authorization Object can contain how many authorization fields

    • A.

      0

    • B.

      10

    • C.

      Defined by Basis

    • D.

      Unlimited

    Correct Answer
    B. 10
    Explanation
    An Authorization Object can contain up to 10 authorization fields. This means that within an authorization object, there can be a maximum of 10 different fields that determine the level of access or permissions granted to a user. These fields can include various parameters such as user ID, transaction code, organizational level, and more, which are used to define and control the authorization process in a system.

    Rate this question:

  • 15. 

    What requirement exists if a field is defined in the dictionary of type CURR

    • A.

      The field must be linked to another field of type CUKY

    • B.

      No other requirement exists

    • C.

      The field must be numeric

    • D.

      Decimals must be defined in the domain

    Correct Answer
    A. The field must be linked to another field of type CUKY
    Explanation
    If a field is defined in the dictionary of type CURR, it must be linked to another field of type CUKY. This means that the field of type CURR represents a currency value and needs to be associated with the currency key field (CUKY) which specifies the currency code. This ensures that the currency value is correctly represented and can be used in calculations or conversions involving different currencies.

    Rate this question:

  • 16. 

    Identify the standard methods commonly found in BAPI's

    • A.

      CREATEFROMDATA

    • B.

      GETDETAIL

    • C.

      GETLIST

    • D.

      CREATELIST

    • E.

      UPDATEDETAIL

    Correct Answer(s)
    A. CREATEFROMDATA
    B. GETDETAIL
    C. GETLIST
    Explanation
    The standard methods commonly found in BAPI's are CREATEFROMDATA, GETDETAIL, and GETLIST. These methods are used for creating data, retrieving detailed information, and retrieving a list of data respectively. These methods are commonly used in BAPI's to perform various operations on data such as creating, updating, and retrieving information from a database or system.

    Rate this question:

  • 17. 

    What is true about PARAMETER objects in ABAP.

    • A.

      Parameter objects are a maximum of 30 characters in length

    • B.

      You can use text elements with parameters

    • C.

      Lower case is the default

    Correct Answer
    B. You can use text elements with parameters
    Explanation
    In ABAP, parameter objects can be used with text elements. Text elements are used to store texts that can be displayed in different languages. These texts can contain placeholders for parameters, which can be replaced with actual values at runtime. This allows for dynamic and localized text generation. Therefore, the statement "You can use text elements with parameters" is true about PARAMETER objects in ABAP.

    Rate this question:

  • 18. 

    What clause on the Select statement is used to invoke authorization checking

    • A.

      It is not possible

    • B.

      User Master Record

    • C.

      CHECK

    • D.

      Authority-Check

    Correct Answer
    A. It is not possible
  • 19. 

    What is the effect of the Move-Corresponding between 2 field strings in the following code:Data: begin of fs1,        Field1 type c value ‘1’,        Field2 type n value ‘2’,        Field3 type I value 3,      end of fs1.Data: begin of fs2,        Field3 type c,        Field4 type n,        Field5 type I,end of fs2.Move-Corresponding fs1 to fs2

    • A.

      All fields of fs1 are moved to fs2

    • B.

      Fs2-field3 = 3

    • C.

      Fs2-field5 = 3

    • D.

      Fs2-field3 = 1

    Correct Answer
    B. Fs2-field3 = 3
    Explanation
    The effect of the Move-Corresponding between 2 field strings in the given code is that all fields of fs1 are moved to fs2. Therefore, fs2-field3 will have the value of 3 after the move.

    Rate this question:

  • 20. 

    What is meant by the software oriented client/server model

    • A.

      Server responds to a client request regardless of hardware

    • B.

      Client responds to a server request regardless of hardware

    • C.

      Server and client are both located on the same software

    • D.

      Server and client are both located on the same hardware platform

    Correct Answer
    A. Server responds to a client request regardless of hardware
    Explanation
    The software oriented client/server model refers to a system where the server is able to respond to client requests regardless of the hardware being used. This means that the server is not dependent on specific hardware components or configurations to process and fulfill client requests. It allows for flexibility and compatibility, as the server can work with different types of hardware setups without any issues.

    Rate this question:

  • 21. 

    What does Compression Mode achieve in the ABAP editor

    • A.

      Reduces the size of the generated load module

    • B.

      Provides the ability to powertype key words

    • C.

      Hides the code between keywords

    • D.

      Limits the functionality of runtime analysis to base features

    Correct Answer
    C. Hides the code between keywords
    Explanation
    Compression Mode in the ABAP editor achieves the purpose of hiding the code between keywords. This means that when Compression Mode is enabled, the code between keywords is not visible, making the code more compact and easier to read. This can be useful in scenarios where the focus is on the keywords themselves rather than the code in between.

    Rate this question:

  • 22. 

    What is the icon that represents a breakpoint

    • A.

      Stop sign

    • B.

      Info sign

    • C.

      Warning sign

    • D.

      Highlighted line

    Correct Answer
    A. Stop sign
    Explanation
    A stop sign is commonly used to represent a breakpoint in programming. When a breakpoint is set, the program execution pauses at that point, allowing the programmer to inspect the current state of the program and debug any issues. The stop sign symbolizes the halt in program execution, indicating that the program will stop and wait for further instructions at that specific point.

    Rate this question:

  • 23. 

    Which fields are used for sorting the internal table ITAB in the following code:Types: begin of itab_structure,         Field1 type p,         Field2 type c,         Field3 type I,         Field4 type n,       end of itab_structure.Data: itab type table of itab_structure.Sort itab.

    • A.

      Field1

    • B.

      Field2

    • C.

      Field1, Field3

    • D.

      Field2, Field4

    Correct Answer
    D. Field2, Field4
    Explanation
    The correct answer is Field2, Field4. In the given code, the internal table ITAB is sorted based on the fields Field2 and Field4. The SORT statement is used to sort the internal table in ascending order based on the specified fields.

    Rate this question:

  • 24. 

    What interface protocol is RFC based on

    • A.

      SNA

    • B.

      TCP/IP

    • C.

      CPIC-C

    • D.

      LU6.2

    Correct Answer
    C. CPIC-C
    Explanation
    The correct answer is CPIC-C because CPIC (Common Programming Interface for Communications) is an interface protocol that allows communication between applications and systems in a network. CPIC-C refers specifically to the C language implementation of CPIC. The RFC (Request for Comments) is a series of documents that define various protocols and standards used in the Internet. While TCP/IP is a widely used protocol suite in the Internet, it is not the specific interface protocol that RFC is based on. SNA (Systems Network Architecture) and LU6.2 (Logical Unit 6.2) are both IBM networking protocols and are not directly related to RFC.

    Rate this question:

  • 25. 

    In which case would you typically use a NUMC field

    • A.

      Where only numbers are allowed and there is a need for arithmetic operations

    • B.

      Where only numbers are allowed and there is no need for arithmetic operations

    • C.

      Where there is a need for numbers, characters, and arithmetic operations

    Correct Answer
    B. Where only numbers are allowed and there is no need for arithmetic operations
    Explanation
    A NUMC field is typically used when only numbers are allowed and there is no need for arithmetic operations. This means that the field can only contain numeric values and cannot be used for performing calculations or arithmetic operations. It is useful in situations where the data being stored or processed only requires numeric values, such as storing phone numbers or postal codes.

    Rate this question:

  • 26. 

    What type of SQL is most commonly used in the ABAP language

    • A.

      ANSI SQL

    • B.

      OPEN SQL

    • C.

      Native SQL

    • D.

      ISO 900 SQL

    Correct Answer
    B. OPEN SQL
    Explanation
    OPEN SQL is the most commonly used type of SQL in the ABAP language. It is a set of SQL statements and commands that are specifically designed for accessing and manipulating data in the SAP system. OPEN SQL provides a standardized and efficient way to interact with the underlying database, making it easier for ABAP developers to write and maintain database operations. It is integrated into the ABAP language and offers a high level of compatibility across different database platforms, making it a preferred choice for ABAP development.

    Rate this question:

  • 27. 

    Where do development objects get stored

    • A.

      In the metadata

    • B.

      In the ABAP workbench

    • C.

      In the dictionary

    • D.

      In the repository

    Correct Answer
    D. In the repository
    Explanation
    Development objects in SAP systems are stored in the repository. The repository is a centralized storage location where all development objects, such as programs, tables, and screens, are stored. It provides a structured and organized way to manage and access these objects. The repository ensures that the objects are available for use across different systems and can be easily transported between systems. Storing development objects in the repository also allows for version control, collaboration, and efficient management of the objects throughout their lifecycle.

    Rate this question:

  • 28. 

    Name the transaction used to view background jobs

    • A.

      SM36

    • B.

      SE37

    • C.

      SE80

    • D.

      SM37

    Correct Answer
    D. SM37
    Explanation
    SM37 is the correct answer because it is the transaction code used to view background jobs in SAP. This transaction allows users to monitor and manage scheduled jobs that are running in the background. By accessing SM37, users can view the status, start time, end time, and other details of background jobs, enabling them to track the progress and performance of these jobs in the system.

    Rate this question:

  • 29. 

    What happens to the program context once the user input from a dialog step has been processed

    • A.

      It remains in the database

    • B.

      It remains in the buffer

    • C.

      It gets rolled out

    • D.

      It gets rolled in

    Correct Answer
    C. It gets rolled out
    Explanation
    Once the user input from a dialog step has been processed, the program context gets rolled out. This means that the program context is removed or cleared, and the system no longer retains any information or memory of the user input. The program context is essentially reset, making way for new inputs and actions in the subsequent steps of the dialog.

    Rate this question:

  • 30. 

    What does SAPNET not provide

    • A.

      Search the Note database

    • B.

      Look for training courses

    • C.

      Seek Problem resolution

    • D.

      Connect to other SAP sites

    Correct Answer
    D. Connect to other SAP sites
    Explanation
    SAPNET does not provide the ability to connect to other SAP sites. It does, however, offer the functionality to search the Note database, look for training courses, and seek problem resolution.

    Rate this question:

  • 31. 

    What table contains the valid activities and values for a specific authorization object

    • A.

      T100

    • B.

      T001

    • C.

      TACTZ

    • D.

      TACT

    Correct Answer
    C. TACTZ
    Explanation
    The table TACTZ contains the valid activities and values for a specific authorization object.

    Rate this question:

  • 32. 

    Where do Dictionary runtime object get stored

    • A.

      In table "nametab"

    • B.

      In structures

    • C.

      In the dictionary

    • D.

      In work processes

    Correct Answer
    A. In table "nametab"
    Explanation
    The Dictionary runtime object is stored in the table "nametab". This table contains information about the structure and components of the Dictionary objects, such as tables, fields, domains, and data elements. Storing the Dictionary runtime object in the "nametab" table allows for efficient access and retrieval of the object's metadata during runtime.

    Rate this question:

  • 33. 

    What should be performed after an R3 upgrade

    • A.

      Release all Change Requests

    • B.

      Run SPDD to adjust dictionary objects

    • C.

      Run SPAU to adjust change requests

    • D.

      Run RDDMASG0

    Correct Answer
    B. Run SPDD to adjust dictionary objects
    Explanation
    After an R3 upgrade, it is necessary to run SPDD to adjust dictionary objects. SPDD stands for Support Package and Data Dictionary, and it is a tool used to adjust the dictionary objects to match the upgraded version. This process ensures that any changes made to the dictionary objects during the upgrade are properly implemented and integrated into the system. By running SPDD, any conflicts or inconsistencies in the dictionary objects can be resolved, ensuring the smooth functioning of the upgraded system.

    Rate this question:

  • 34. 

    What access method is available for hash tables

    • A.

      Indexed

    • B.

      Hashed

    • C.

      Sorted

    • D.

      Keyed

    Correct Answer
    D. Keyed
    Explanation
    The access method available for hash tables is "Keyed." In a hash table, data is stored and retrieved using a unique key associated with each data item. This key is used to calculate the index where the data is stored in the hash table. Therefore, the correct answer is "Keyed."

    Rate this question:

  • 35. 

    What statement will clear the entire contents of the internal table ITAB that has no header line. Types: begin of itab_structure,         Field1 type p,         Field2 type c,         Field3 type I,         Field4 type n,end of itab_structure.Data: itab type standard table of itab_structure.Data: wa_itab type itab_structure.

    • A.

      Clear itab

    • B.

      Initialize wa_itab

    • C.

      Clear wa_itab

    • D.

      Initialize itab

    Correct Answer
    A. Clear itab
    Explanation
    The statement "Clear itab" will clear the entire contents of the internal table ITAB. The "Clear" statement is used to reset all the fields of a structure or internal table to their initial values. In this case, "Clear itab" will clear all the rows in the internal table ITAB, removing all the data from it.

    Rate this question:

  • 36. 

    What event is used to create detail lists

    • A.

      Suppress Dialog

    • B.

      New-Page

    • C.

      On Detail

    • D.

      At Line-Selection

    • E.

      Initialization

    Correct Answer
    D. At Line-Selection
    Explanation
    The event "At Line-Selection" is used to create detail lists. This event is triggered when the user selects a line in the list and allows for further actions to be performed on that specific line. It is commonly used in programming to provide detailed information or perform specific actions based on the user's selection.

    Rate this question:

  • 37. 

    What is a mandatory rule when programming the authority-check statement in an ABAP program

    • A.

      Fields of the Authority-check are optional

    • B.

      If you do not want to carry out a check for a field, it must contain the value "DUMMY"

    • C.

      The Authority-Check object must be in your profile

    Correct Answer
    B. If you do not want to carry out a check for a field, it must contain the value "DUMMY"
    Explanation
    When programming the authority-check statement in an ABAP program, it is mandatory to include the value "DUMMY" in a field if you do not want to carry out a check for that field. This means that if you want to skip the authorization check for a particular field, you must assign the value "DUMMY" to it. This ensures that the authority-check statement does not perform a check for that specific field and allows the program to proceed without validating the authorization for that field.

    Rate this question:

  • 38. 

    Refer to the following code.  What is the value of Field1 and Field2 SPLIT 'SAPDOMAIN' AT 'DO' INTO FIELD1 FIELD2.

    • A.

      Field1 contains 'SAPDO'; Field2 contains 'MAIN'

    • B.

      Field1 contains 'DO'; Field2 contains 'DOMAIN'

    • C.

      Field1 contains 'SAP'; Field2 contains 'MAIN'

    Correct Answer
    C. Field1 contains 'SAP'; Field2 contains 'MAIN'
    Explanation
    The SPLIT statement is used to split a string into substrings based on a delimiter. In this code, the string 'SAPDOMAIN' is split at the delimiter 'DO'. The first substring before the delimiter is assigned to Field1, and the second substring after the delimiter is assigned to Field2. Therefore, the value of Field1 is 'SAP' and the value of Field2 is 'MAIN'.

    Rate this question:

  • 39. 

    What are the differences between Parameters and Select-options in a selection screen

    • A.

      Select-Options use the FOR statement; Parameters use the Type statement

    • B.

      Parameters create a single field, Select-Options create multiple fields

    • C.

      Select-Options create a single field, Parameters create multiple fields

    • D.

      Parameters use the FOR statement; Select-Options use the Type statement

    Correct Answer(s)
    A. Select-Options use the FOR statement; Parameters use the Type statement
    B. Parameters create a single field, Select-Options create multiple fields
    Explanation
    Parameters and Select-Options in a selection screen have different characteristics. Parameters use the Type statement, which means they create a single field. On the other hand, Select-Options use the FOR statement, allowing the creation of multiple fields. Therefore, the correct answer is that Select-Options use the FOR statement, while Parameters use the Type statement.

    Rate this question:

  • 40. 

    What can occur of a conversion rule does not exist for fields of incompatible data types

    • A.

      A syntax error for statically defined fields

    • B.

      A syntax error for dynamically defined fields

    • C.

      A run time error for dynamically defined fields

    • D.

      A run time error for statically defined fields

    Correct Answer(s)
    A. A syntax error for statically defined fields
    C. A run time error for dynamically defined fields
    Explanation
    If a conversion rule does not exist for fields of incompatible data types, it can result in a syntax error for statically defined fields. This means that when the code is compiled, the compiler will detect the error and display a syntax error message. On the other hand, if the fields are dynamically defined, a run time error will occur. This means that the error will not be detected during compilation, but will instead happen during the execution of the program, causing it to terminate abruptly and display an error message.

    Rate this question:

  • 41. 

    Select the valid types of user dialogs

    • A.

      Business Objects

    • B.

      Screens

    • C.

      Selection Screen

    • D.

      Logical Database

    • E.

      Lists

    Correct Answer(s)
    B. Screens
    C. Selection Screen
    E. Lists
    Explanation
    The valid types of user dialogs are Screens, Selection Screen, and Lists. Screens refer to the graphical user interface elements that allow users to interact with the system. Selection Screen is a type of screen that enables users to input values or make selections to filter data. Lists, on the other hand, display information in a tabular format for users to view and analyze. Business Objects and Logical Database are not valid types of user dialogs as they are not directly involved in user interaction.

    Rate this question:

  • 42. 

    What possibilities are made available to the user when using selection screens

    • A.

      Type Checks

    • B.

      Menu Trees

    • C.

      Variants

    • D.

      Translation Utilities

    • E.

      Complex Entries

    Correct Answer(s)
    A. Type Checks
    C. Variants
    E. Complex Entries
    Explanation
    When using selection screens, the user is provided with various possibilities. Type checks allow the user to validate the input data against predefined data types. Variants enable the user to save and reuse specific selection criteria. Complex entries allow the user to enter multiple values for a single selection field. These possibilities enhance the flexibility and efficiency of the selection process for the user.

    Rate this question:

  • 43. 

    What part of an SAP system is responsible for converting OPEN SQL statements to Native SQL

    • A.

      ABAP interpreter

    • B.

      Database Server

    • C.

      Database Interface

    • D.

      Dispatcher

    • E.

      Basis System

    Correct Answer
    C. Database Interface
    Explanation
    The Database Interface is responsible for converting OPEN SQL statements to Native SQL in an SAP system. It acts as a bridge between the ABAP interpreter and the Database Server. The Database Interface translates the generic OPEN SQL statements into database-specific Native SQL statements, allowing the ABAP program to interact with the database. This ensures compatibility and efficient communication between the ABAP program and the underlying database.

    Rate this question:

  • 44. 

    In the case of a function, identify the item that is not a valid interface element

    • A.

      Tables

    • B.

      Exceptions

    • C.

      Import parameters

    • D.

      Export parameters

    • E.

      Source Code

    Correct Answer
    E. Source Code
    Explanation
    In the context of a function, tables, exceptions, import parameters, and export parameters are all valid interface elements. Tables can be used to store and manipulate data, exceptions can be used to handle errors and unexpected situations, import parameters are used to pass values into the function, and export parameters are used to return values from the function. However, source code is not considered a valid interface element as it refers to the actual code implementation of the function, rather than an element that interacts with the user or other parts of the system.

    Rate this question:

  • 45. 

    Identify the only method found in class GL_GUI_CUSTOM_CONTAINER

    • A.

      Destructor

    • B.

      Constructor

    • C.

      Refresh

    • D.

      Class

    Correct Answer
    B. Constructor
    Explanation
    The only method found in class GL_GUI_CUSTOM_CONTAINER is the constructor. A constructor is a special method in a class that is used to initialize objects of that class. It is called automatically when an object is created and is responsible for setting initial values for the object's attributes. In this case, the GL_GUI_CUSTOM_CONTAINER class likely requires a constructor to initialize its properties and prepare the object for use.

    Rate this question:

  • 46. 

    How would you set breakpoints in your program for debugging

    • A.

      In the program editor, set breakpoint

    • B.

      Put a break-point statement in your program code

    • C.

      Start program in background mode

    • D.

      In Development workbench, set breakpoint

    Correct Answer(s)
    A. In the program editor, set breakpoint
    B. Put a break-point statement in your program code
    Explanation
    To set breakpoints in a program for debugging, you can either use the program editor to set breakpoints or insert a break-point statement directly into the program code. Both methods allow you to pause the program's execution at specific points to inspect variables, check the flow of the program, and identify any errors or unexpected behavior.

    Rate this question:

  • 47. 

    Identify the internal table types.

    • A.

      Hashed

    • B.

      Sorted

    • C.

      Key

    • D.

      Indented

    • E.

      Standard

    Correct Answer(s)
    A. Hashed
    B. Sorted
    E. Standard
    Explanation
    The internal table types mentioned in the question are Hashed, Sorted, and Standard. Hashed tables are used for fast access to data using a unique key. Sorted tables store data in a sorted order based on a key field. Standard tables are unsorted and can be accessed using a linear search. These are the three commonly used internal table types in ABAP programming.

    Rate this question:

  • 48. 

    Identify the servers of which only one can exist in an R/3 system

    • A.

      One application server

    • B.

      One messager server

    • C.

      One database server

    • D.

      One enqueue server

    • E.

      One presentation server

    Correct Answer(s)
    B. One messager server
    C. One database server
    D. One enqueue server
    Explanation
    In an R/3 system, there can only be one messager server, one database server, and one enqueue server. This is because these servers perform critical functions and having multiple instances of them could lead to conflicts and inconsistencies in the system. The messager server is responsible for communication between different components of the system, the database server manages the database and its operations, and the enqueue server handles locking mechanisms to ensure data integrity. Having multiple instances of these servers would undermine their purpose and create potential issues in the system.

    Rate this question:

  • 49. 

    Identify the includes that would get generated if your program name is SAPMZMYPROGRAM

    • A.

      MZMYPROGRAMTOP

    • B.

      SAPMZMYPROGRAMTOP

    • C.

      MZMYPROGRAMINCLUDE

    • D.

      SAPMZMYPROGRAM

    • E.

      MZMYPROGRAMDATA

    Correct Answer
    A. MZMYPROGRAMTOP
    Explanation
    The given answer, "MZMYPROGRAMTOP," is a possible include that would be generated if the program name is SAPMZMYPROGRAM. It is likely that this include file contains additional code or functions that are required for the program to run successfully.

    Rate this question:

  • 50. 

    How is security handled at the application level

    • A.

      The authorization concept is used to restrict access to users

    • B.

      The authorization concept is used to restrict access to the dictionary

    • C.

      The authorization concept is used to restrict access to data and transactions

    • D.

      The authorization concept is used to restrict access to servers and work processes

    Correct Answer
    C. The authorization concept is used to restrict access to data and transactions
    Explanation
    Security at the application level is handled through the use of authorization concepts. This means that access to data and transactions within the application is restricted based on user permissions. By implementing authorization controls, the application ensures that only authorized users can access and manipulate sensitive information and perform specific actions. This helps to protect the integrity and confidentiality of the data and transactions within the application.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 13, 2009
    Quiz Created by
    Newtonskn
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.