Answer these 100+ SAP ABAP MCQs and see how sharp is your knowledge of SAP ABAP.
Scroll down and let's start!
A. Advanced Business Application Programming
B. Advanced Business Application Procedure
C. Advanced Best Applications Programs
D. Applications for Business And Programs
A. Method
B. Interface
C. Subroutine
D. Function Module
A. Field Length
B. Decimal Places
C. Type
D. Name
A. SELECT
B. WHILE
C. DO
D. LOOP
A. 6
B. 4
C. 9
D. 3
A. False
B. True
A. ALL OF THE ABOVE
B. SE37
C. SE80
D. SE18
E. SE38
A. Pooled
B. Transparent
C. Transport
D. Cluster
A. SE11
B. CL01
C. CT04
D. SE18
E. SMARTFORM
A. DO
B. FOR
C. WHILE
D. LOOP
A. PHP
B. Java
C. Web Dynpro
D. BSP
A. EQ
B. ==
C. =
D. <
A. Invalid
B. Non Mandatory
C. Structure
D. Client Independent
A. Transports
B. Modules
C. Programs
D. Packages
A. SM01
B. SU01
C. SM35
D. SP01
A. False
B. True
A. Transparent Table
B. All of them
C. Pool Tables
D. Cluster Tables
A. C
B. D
C. W
D. I
A. Currency and Quantity
B. Quantity
C. Currency
D. Decimal
A. False
B. True
A. T101
B. MARA
C. 1001
D. T100
A. SE11
B. SE80
C. SE38
D. SU01
A. False
B. True
A. True
B. False
A. True
B. False
A. Material Management
B. Modular Measurement
C. Module Management
D. Master Mind
A. Change Control
B. Initialization
C. Variant
D. Description
A. False
B. True
A. SY-TZONE
B. SY-DATE
C. SY-DATUM
D. SY-DAT
A. Authorization
B. Update
C. Enqueue/Dequeue
D. Spool
A. True
B. False
A. Released
B. Copy
C. Active
D. Connected
A. Title
B. Status
C. Identification number
D. Application
A. Authorization Objects
B. Change Control Object
C. Change and Transport System
D. Change Control System
A. False
B. True
A. False
B. True
A. Store non-public IP address
B. Allow Hackers access
C. To maintain session IDs
D. Expose private data
A. SE11
B. SE93
C. SM11
D. SM12
A. class
B. object
C. internal table
D. structure
A. False
B. True
A. Date and Time
B. Underline
C. Page Number
D. List Title
A. User Input from GUI
B. Database
C. Configuration File
D. Powerpoint
A. Application Log
B. Remote Function Call
C. Distributed Statistics Record
D. SAPCCMSR
A. False
B. True
A. BAPIs can only be called from external systems.
B. BAPIs are stored in the Busineess Object Repository.
C. BAPIs show an object-oriented view of R/3 business functions.
D. BAPIs are defined as API methods of SAP business object types.
A. False
B. True
A. Condense <string>
B. Condense <string> no-spaces
C. Concat <string>
D. Condense <string> no-gaps
A. Domains
B. Documentation
C. Tables
D. Buffers
A. BADIs
B. BAPIs
C. Objects
D. Enhancement spots
A. Alphabetical Types
B. Character Types
C. Hexadecimal types
D. Numeric types
A. SAP HANA
B. ABAP System Search
C. ANST Automated Notes Search Tool
D. ECC Enterprise Controlling Component
A. User Input
B. Unrecognized Input
C. Trusted source
D. Insufficient time
A. False
B. True
A. Method
B. Event
C. Object
D. Attribute
A. GridData
B. FlowData
C. MatrixData
D. LineData
A. Static Check
B. Extended Program Check
C. Data Check
D. Syntax Check
A. False
B. True
A. CALL EVENT
B. START EVENT
C. RAISE EVENT
D. TRIGGER EVENT
A. Byte Strings
B. Numeric Type
C. Complex Data
D. Decimal Data
A. ADD
B. APPEND
C. MODIFY
D. INSERT
A. Operands
B. Keyword
C. Additions
D. Comma
A. Cross-Site Scripting
B. External Security Setting
C. XS Software
D. Xtra Security Sets
A. True
B. False
A. System > User Profile
B. System > Editor
C. Utilities > Settings
D. Environment > Transport Organizer
A. CLASS-DATA
B. DATA
C. STATICS
D. (All of these)
A. Words within a statement must be separated with at least one space.
B. Statements may be indented.
C. Many statements may be written on one line.
D. A single statement must be written all on one line.
A. False
B. True
A. Use Reference Semantics
B. Pointers to Data Objects
C. Contents of Variables
D. Specify Object Name
A. CHANGE
B. EXECUTE
C. RUN
D. UNION
A. UTF Encoding
B. Escape Encoding
C. Net Encoding
D. URL Encoding
A. Complex
B. Structural
C. Elementary
D. Reference
A. SM30
B. SE11
C. EWK1
D. SQ01
A. Programs
B. Transports
C. Modules
D. Packages
A. Programs
B. Modules
C. Transports
D. Packages
A. If you want to define a two-byte integer data object, you use the follow-ing syntax: DATA xyz(2) TYPE i.
B. If you create a data object without explicitly specifying its type, it will become type C with length 1.
C. If you define a data object with type D, two or four digits will be re-served for the year, depending on the user's settings.
D. A data object of type STRING has a fixed length that will automatically be set when the first value is assigned to this data object. This length cannot be adjusted thereafter.
During an upgrade project to SAP NetWeaver 7.0, you are asked for a strategy to convert the implemented classic BAdIs to the new BAdI type.
What do you recommend?
A.
Perform the migration of customer BAdIs and BAdIs that are provided by SAP With the available migration tool.
B.
Use the procedure for semi-automatic migration because of existing differences between classic and new BAdIs.
C.
Perform a completely automated migration of all existing classic BAdIs with the available migration tool.
D.
Create new BAdIs because a conversion of classic BAdIs is not foreseen.
A. If a customer exit is not implemented, the program offering this customer exit will dump (terminate abnormally) at runtime.
B. Within one SAP system, a customer exit can have a maximum of one implementation.
C. Within one client of an SAP system, a customer exit can have multiple implementations.
D. Once a customer exit has been implemented in an SAP system, the implementation can be changed, but it cannot be deactivated any more.
A customer wants to develop a Web application with Web Dynpro for Java as the front-end technology and a SAP ERP 6.0 system as the backend.
Which type of external interface do you use to generate a Web Dynpro model automatically with a minimum of effort?
A.
RFC
B.
BAPI
C.
Web Service
D.
Java Connector
A customer has implemented an enhancement for a transaction by using the predefined customer subscreen. The program contains the necessary plausibility checks for the values on the subscreen. However, from time to time, data fields are updated with values that are not allowed.
What do you recommend to solve this problem?
A.
Modify all dynpros that use data from the plausibility checks.
B.
Implement new plausibility checks for every dynpro change.
C.
Implement the same plausibility checks in the User Exit "before save".
D.
Implement an additional program to correct the wrong data field values.
An international retail company needs a customer-specific list in SAP ERP that shows accumulated order values in a selectable currency.
What do you need to know to create this program?
A.
Converting factors of source currencies
B.
Converting factors of target currency
C.
Source currency of the orders
D.
Local currency in the system
A. If it deals with encapsulated data of another class
B. If it mediates between two other classes
C. If it improves maintainability
D. If it only contains methods
There are basically three types of SELECT statements: SELECT SINGLE, SELECT ... ENDSELECT, and SELECT ... INTO TABLE. The SELECT ... ENDSELECT statement is also known as the SELECT loop.
Below, you will find a list of comments about SELECT ... ENDSELECT. Which of them are correct?
A.
A work area (structure) is required for the selected rows. This work area can be given explicitly (with INTO) or implicitly (if a TABLES declaration is used).
B.
The database will transport individual rows to the database interface.
C.
The database will transport blocks of rows to the database interface.
D.
The system field sy-tabix counts the number of selected table rows.
A. The ALV Grid Control can be integrated into a list, a selection-screen, and a classical screen (dynpro).
B. By default, a column header will be taken from the data element which is used for specifying the type of the column.
C. When a report with an ALV Grid Control is executed in background processing, the program will terminate abnormally since controls can-not be addressed in background processing.
D. The ALV display is automatically refreshed when the data in the data-base table is changed.
A. Directly before the foreign key of the corresponding customizing table
B. Directly after the foreign key of the corresponding customizing table
C. At the last position of the key fields of the text table
D. The position of the language key field does not matter
Your transport request is released in system X and imported in system Y.
Which method is used to transport the data from X to Y?
A.
File on a file system
B.
Database table
C.
Remote Function Call
D.
File on an IDoc
A. A programmer can, but need not, determine the visibility of a component. The default visibility of a component is PRIVATE.
B. A PRIVATE component of a class can be accessed in all methods of that class.
C. A PROTECTED method METH that is defined in a class SUPER can be overwritten (redefined) in an inherited class SUB.
D. All components of inherited classes are PUBLIC.
A. Support of Test Data Migration Server (TDMS) for test preparation
B. Support of Visio for process modeling
C. Support of SAP Early Watch Alert for early problem detection
D. Support of SAP Project System (PS) for cost planning
A. The installation of the packages has to be done in chronological order to make sure the project can use best practices.
B. The installation is independent from the existing installation and all functions of the package will be activated at once.
C. The installation is done via OSS so that the projects themselves do not require administrative knowledge.
D. The installation of a whole package is required, but it is possible to activate only parts of it.
You need to read an ABAP report from a database that is not declared in the ABAP Dictionary.
How do you do this?
A.
With open SQL
B.
With native SQL
C.
With NetWeaver AS ABAP
D.
With a remote Java call function
A. Customer Exits have a predefined interface with the possibility to activate and deactivate them.
B. Customer Exits need an SSCR (SAP Software Change Registration) registration.
C. User Exits have a predefined interface with the possibility to activate and deactivate them.
D. User Exits need an SSCR (SAP Software Change Registration) registration.
In a customer application, it is necessary to save texts with undefined size.
Which table type do you use to minimize programming efforts?
A.
Transparent table with field type TEXT80 for the text
B.
Transparent table with field type STRING for the text
C.
Cluster table with application key and others fields
D.
Pool table with normal construction
You analyze the complexity of a customer-specific program to determine the expected maintenance efforts.
Which measure do you use?
A.
Number of binary decision points (for example, IF-statements)
B.
Number of references to other modularization units
C.
Number of executable statements
D.
Number of methods and interfaces
Your customer wants to use SAP NetWeaver Master Data Management ( MDM ) to cleanse and distribute business partners created in SAP CRM within the existing heterogeneous system environment.
Which standard MDM scenario do you recommend using?
A.
Master data consolidation
B.
Master data harmonization
C.
Central master data management
D.
Local master data management
A. Type all interface parameters.
B. Document all interface parameters.
C. Insert commands by using patterns.
D. Name all interface parameters differently.
A. Clear the content of all internal tables.
B. Execute the COMMIT function module.
C. Close the form.
D. Disable the PDF printer.
A. An internal table can be linked to a database table so that the content of the internal table is updated automatically as soon as the content of the database table changes.
B. A data base table XYZ can be used for the definition of an internal table like this: DATA itab TYPE TABLE OF xyz.
C. A data base table in the Dictionary can be defined with reference to an internal table from an ABAP program.
D. If you have a huge number of rows to be dealt with in a program, it might improve the program's performance if you define a database table in the program instead of an internal table.
You cannot book the business data during processing of an incoming IDoc.
How must the function module react to this problem?
A.
Send the IDoc backward
B.
Trigger an event for sender
C.
Set an error status in the control record
D.
Create a Batch Input map
A. You should set dynamic breakpoints only directly in the Debugger at runtime.
B. You should use dynamic breakpoints only if the program is locked by another user.
C. You can use dynamic breakpoints only up to a limited number without changing the program.
D. If the line where you set a breakpoint already contains a breakpoint, it is deleted.
A. Service level reporting
B. Document management with display and print of digitally-signed documents
C. Service desk and root cause analysis
D. Test workbench with integrated Test Data Migration Server (TDMS)
A. Refer to a table type directly, using TYPE
B. Refer to a previously defined elementary data object in the same program, using LIKE
C. Refer to a previously defined elementary data object in the same program, using FOR
D. Refer to a Dictionary table type with columns SIGN, OPTION, LOW, and HIGH, using FOR