You are on page 1of 19

1.

Non-SAP solutions can be integrated consistently with the customers’ core business
processes through ___________________.

A service-oriented architecture(SOA)

2. "SAP Business All-in-One is the ideal solution for


small and midsize companies (having up to 2,500
employees) with stable processes and that want to use a
preconfigured system from SAP."

True

3. "SAP ERP does not support industry-specific processes. "

False

4.
Identify the key capabilities of SAP NetWeaver.

Service-oriented architecture (SOA) middleware

Security and Identity management


Business intelligence

4.
Identify the different installation options for SAP NetWeaver Application Server (AS).
SAP NetWeaver AS ABAP
SAP NetWeaver AS Java
SAP NetWeaver AS ABAP + Java

5."In the customer-specific maintenance phase, Support Packages are delivered to


customers to solve system and customer issues."

False

6.___________ are used to solve (component-dependent) problems that arise when using
SAP software.
Choose the correct answer.

Designed by CSE-B
Support packages

Extended maintenance components

Central ERP functions

7.
The user data in SAP systems is called the ______________________.
Choose the correct answer.

User record

User master record

Stored record

8."You can work in only one window (session) at a time in an SAP system."

False

9.
The following strings are valid entries in the command field in the SAP Easy Access screen.

/ned
/nsm04

/nex

10.Identify the statements that accurately describe a client in an SAP system.


Choose the correct answers.

A client represents a completely independent business entity.

A client has its own database.

A client corresponds to a customer.

A client may represent an entire company

Designed by CSE-B
11.
Only ___________ can change the entries of the SAP and user menus.
Choose the correct answer.

Current users

System administrators

12."Java is an object-oriented and a platform-independent programming language. "

True

13. "In a two-tier client/server configuration, each layer runs on its own hosts."

False

14.
What are the advantages of a three-tier client/server configuration as compared with a single-
tier or two-tier configuration?
Choose the correct answers.

Simpler scalability

Simpler administration

Load balancing

None of the above

15. "The Software Deployment Manager (SDM) is the standard tool used to install
ABAP software components."

False

16. "The gateway reader enables communication between SAP systems or between SAP
systems and external application systems. "

True

Designed by CSE-B
17. "Data does not need to be read from the database every time it is required in an
instance. But the data can be called quickly from the buffer."

True

18.

__________________________ is used to manage large sets of data.

Choose the correct answer.

A Graphical User Interface (GUI)

A Relational Database Management System

A Dynpro processor

An ABAP dispatcher

19.
Identify the types of work processes in an AS ABAP system.

Dialog work process

Message Server process

Update work process

Internet Communication Manager (ICM) process

Background work process

Enqueue work process

Spool work process

20. In ___________, several users can have read access to locked data
at the same time.
Choose the correct answer.

Write locks

Read locks

Enhanced write locks

Optimistic locks

Designed by CSE-B
21. _____________ facilitates internal and external access to business
processes and data in SAP systems.
Choose the correct answer.

The Business Object Repository (BOR)

A Business Application Programming Interface (BAPI)

Application Link Enabling (ALE)

22. Identify the interfaces and communication options that are


supported by SAP systems.
Choose the correct answers.

HyperText Transfer Protocol (HTTP)

Simple Mail Transfer Protocol (SMTP)

Remote Function Call (RFC)

Business Application Programming Interfaces (BAPIs)

Extended Data Transfer Protocol

SAP Transfer Protocol

23.For which of the following functions can Business Application


Programming Interfaces (BAPIs) be used?
Choose the correct answers.

Request data from an SAP system

Pass data to an SAP system

Transfer SAP screen images to third-party applications (such as


Microsoft Word)

Access business processes in SAP systems

24.Business __________ Programming Interfaces (BAPIs) are


specialized ___________ modules. They are accessed using the
____________ interface. They are created and managed using the
___________ Builder.
Choose the correct answer.

Application, function, Remote Function Call, Function

Designed by CSE-B
Application, Remote Function Call, Function, function

Application, Function, Remote Function Call, function

Function, Remote Function Call, function, Application

25.What action can you perform with Application Link Enabling


(ALE)?
Choose the correct answers.

Exchange data exclusively between SAP systems of the same release

Exchange data across system boundaries, but only between SAP


applications

Exchange data between collaborating enterprises, using certain formats


and technologies

Communicate between the systems of your system landscape

Update your order data using the appropriate Business Application


Programming Interface (BAPI) (only once every 24 hours)

26."Composite processes are extensions of SAP Business Suite."

True

27.Which of the following system development objects are included in the Repository?

Choose the correct answers.

Programs

Function modules

Object Navigator

Definitions of database tables

28. Which of the following ABAP Workbench tools is used for editing the source code?

Choose the correct answer.

Designed by CSE-B
ABAP Editor

ABAP Dictionary

Repository Information System

Menu Painter

29. Which of the following are package types?

Choose the correct answers.

Application component

Standard package

Main package

Software component

30. When is the transport of development objects for a development request triggered?

Choose the correct answer.

When an object is saved

When an object is activated

When a task is released

When a request is released

31. "Whenever you create or change a development object and save it, the system stores
two inactive versions in the Repository."

False

32. Which of the following statements is correct about the ABAP programming language?

Choose the correct answers.

It enables multi-language applications.

It enables SQL access.

It is platform-dependent.

Designed by CSE-B
It is downward-compatible.

It is typed.

33. "ABAP Objects are object-oriented enhancements of the ABAP programming


language."

True

34. How do you include comment lines?

Choose the correct answer.

Begin the line with a pound # in the first column.

Begin the line with an asterisk * in the first column.

End the line with an asterisk * in the last column.

End the line with a pound # in the last column

35. After a project employee completes the required development task, he or she should
do the following:

Choose the correct answer.

Transfer the task to the Production System

Release the task within the Change request

Unlock and export the task to the Transport Directory

Export the Project Request

36. Which of the following are complete ABAP standard types?

Choose the correct answers.

T (Time)

C (Character)

N (Numerical character)

D (Date)

Designed by CSE-B
37. In IF statements, negations are usually formulated by placing the ______ operator
before the logical expression.

Choose the correct answer.

AND

OR

END

NOT

38.

Which of the following are required in the syntax of the Message statement?

Choose the correct answers.

Message number

Message type

Message class

Message role

39. In nested loops, which of the following contains the loop pass number of the loop in
which it is located?

Choose the correct answer.

sy-index

sy-repid

sy-uname

sy-mandt

40.To switch to debugging mode at run time, we can enter _______ in the command
field .

Choose the correct answer.

/d

/h

Designed by CSE-B
/i

/a

41. Which of the following can be used as a visibility option for an attribute ?

Choose the correct answers.

Public

Private

Static

Instance

42. What are the uses of modularization?

Choose the correct answers.

To improve performance

To provide a better overview of program layout

To encapsulate a function that is program for multiple use required many times within
a

To implement the central maintainability of a function within a program

To make a function available across the system

43. The assignment of actual parameters to formal parameters when calling a


subroutine is called_______________.

Choose the correct answer.

interface assignment

parameter passing

interface call

subroutine call

44. Variables defined in the main program are ____________.

Choose the correct answer.

global data objects

local data types

Designed by CSE-B
local and global data types

45. Which of the following elements does the interface of a function module contain?

Choose the correct answers.

Export parameter

Subroutines

Changing parameter

Screen

46. After defining the corresponding IMPORTING and EXPORTING parameters, you
can switch to the ______________ tab page to implement the functions of the function
module.

Choose the correct answer.

standard

code

source code

attributes

47. The comment block directly under the keyword FUNCTION is created
automatically by the ___________.Choose the correct answer.

Object Navigator

Function Builder

Function Module

48. "Data in the SAP system can be accessed by means of a Business Application
Programming Interface (BAPI)."

True

49. Which of the following can be used as a visibility option for an attribute ?

Choose the correct answers.

Designed by CSE-B
Public

Private

Static

Instance

50. "The system calls the methods using the CALL CLASS METHOD statement."

False

51.Determine whether this statement is true or false.

"When you identify a method as a static method, it can be called directly without the
need to generate an instance of the class first."

True

52. "To create a static method, all you need to do is enter its name in the Constructor
list."

False

53.Which of the following special tools maintains global classes?

Choose the correct answer.

Object Builder

Class Builder

Method Builder

Attribute Builder

54.Determine whether this statement is true or false.


"To define an instance method as opposed to a static method in a local class, the
METHODS statement is used instead of CLASS-METHODS. "

True

Designed by CSE-B
55. Which of the following statements copies the content of the source structure to the target
structure,one component at a time?

Choose the correct answer.

COPY-CORRESPONDING

REPLACE-CORRESPONDING

MOVE-CORRESPONDING

REMOVE-CORRESPONDING

56. Which of the following statements is used for defining local structure types?

Choose the correct answer.

TYPES

BEGIN

END

START

57. Which of the following specifications are required in the definition of an internal table?

Choose the correct answers.

Line type

Primary key

Secondary key

Table kind

58. Which of the following is used for adding a row into an internal table ?

Choose the correct answer.

ADD LINE

INSERT ROW

APPEND

UPDATE TABLE

Designed by CSE-B
59. For each entity fixed in the data model, the developer creates a transparent table in the
_________.

Choose the correct answers.

transparent field

ABAP Dictionary

data field

database

60. Determine whether this statement is true or false.

"When using the transparent table as a data type, other properties, such as the key
definition or the technical properties, are relevant."

False

61. Which of the following are the types of reuse components that encapsulate database
access?

Choose the correct answers.

Conceptual database

Function modules

Business Application Programming Interfaces (BAPIs)

Methods of local classes

62. Determine whether this statement is true or false.

"The SELECT clause determines which lines are read into thetarget structure and
processed using the statement block which you specify in the loop body. "

False

63. If you want to append rows in a Select statement, you can use the _________ addition.

Choose the correct answer.

INTO TABLE

Designed by CSE-B
APPENDING TABLE

INTO CORRESPONDING FIELD OF TABLE

END SELECT

64. Determine whether this statement is true or false.

"If you select data from client-specific tables withoutspecifying the client, data records
from the current and all other clients are read."

False

65. In the worst-case scenario, the system has to search the entire table, or at least a
very large part thereof, for the required entries. This concept is referred to as ________.

Choose the correct answer.

direct search

binary search

sequential search

indirect search

66. Which of the following should you specify when defining a table join?

Choose the correct answers.

Join tables

Join conditions

Join rows

Join columns

67. "If an ABAP program reads a buffered table, the databaseinterface tries to get the
required data from the SAP table buffer."

True

68. Which of the following statements are contained within Open SQL?

Designed by CSE-B
Choose the correct answers.

CREATE

UPDATE

INSERT

SELECT

69. Determine whether this statement is true or false.

"You can define authorization objects within object classes."

True

70. At runtime, which of the following statements can you use to check whether the
actual user has the authorization required for executing the function in the user master
record?

Choose the correct answer.

AUTHORITY

SELECT

AUTHORITY-CHECK

VALID AUTHORITY

72. You can use the __________ to adapt the default list interface to your own needs.

Choose the correct answer.

WRITE statement

Menu Painter

Pattern function

73. Which of the following are standard functionality on a selection screen?

Choose the correct answers.

Singular capability

Type check

Designed by CSE-B
Variants

Value entry

74.Which of the following statements is used for defining an input variable?

Choose the correct answer.

DATA

VALUE

PARAMETERS

DEFAULT

75. Which of the following are the characteristics of an event block?

Choose the correct answers.

Ends by beginning the next processing block

Can be nested

Existence not absolutely necessary

Sequence of event blocks important

76. Which of the following statements about the Code Inspector are true?

Choose the correct answers.

You can only use the DEFAULT check variant.

You can create a check variant to define the details of what to check.

Standard inspection is carried out when check is performed through context menu from the
Object Navigator.

You can define check variants, object sets, and inspections using transaction SCI

77. Which aspects does the Code Inspector take into consideration when examining a
program?

Choose the correct answers.

Designed by CSE-B
Syntax check

Typical semantic errors (for example, AUTHORITY-CHECK statement without subsequent


SY-SUBRC check)

Performance (for example, nested SELECT statements)

Security (for example, cross-client data accesses)

Formatting of the source code (for example, indenting of the program lines within loops)

78. If you use the ___________________ statement, the system terminates the current
program and starts the transaction with transaction code T_CODE.

Choose the correct answer.

SUBMIT

AND RETURN

LEAVE TO TRANSACTION 'T_CODE'

CALL TRANSACTION 'T_CODE

79. What are the modifiable parts of a program?

Choose the correct answer.

Byte code for statements

Values of constants and literals

Program texts

Screen definitions

Data objects (variables)

80. What statement can also delete the table header if it takes up too much memory?

Choose the correct answer.

CLEAR

REFRESH

FREE

Designed by CSE-B
81. The ______________ statement defines and executes the access, but does not pass any
data on to the application program.

Choose the correct answer.

FETCH

OPEN CURSOR

FETCH NEXT CURSOR

CLOSE CURSOR

82. The __________ operator is used for comparison with a single list of values.

Choose the correct answer.

LIKE

IN

BETWEEN

IS

83. _____________ corresponds to the result set that only considers the records from the
outer table forwhich suitable data records exist in the inner table.

Choose the correct answer.

LEFT OUTER JOIN

INNER JOIN

OUTER JOIN

84. To read large data volumes, you should use _______________ only in exceptional cases.

Choose the correct answer.

SELECT

SELECT SINGLE

FOR ALL ENTRIES

Designed by CSE-B

You might also like