NEW TEST Q3
![]() |
![]() |
![]() |
Title of test:![]() NEW TEST Q3 Description: TEST1 - Q with 3 Ans |




New Comment |
---|
NO RECORDS |
Which of the following results in faster access to internal tables? Note: There are 3 correct answers to this question. In a sorted internal table, specifying the primary key partially from the left without gaps. In a hashed internal table, specifying the primary key completely. In a sorted internal table, specifying the primary key completely. In a standard internal table, specifying the primary key partially from the left without gaps. In a hashed internal table, specifying the primary key partially from the left without gaps. Which of the following are valid sort operations for internal tables? Note: There are 3 correct answers to this question. Sort a sorted table using SORT itab DESCENDING. Sort a sorted table using SORT itab BY field1 ASCENDING field2 DESCENDING. Sort a standard table using SORT itab ASCENDING. Sort a standard table using SORT itab BY field1 field2. Sort a standard table using SORT itab. In an Access Control Object, which clauses are used? Note: There are 3 correct answers to this question. Where (to specify the access conditions). Return code (to assign the retum code of the authority check). Define role (to specify the role name). Revoke (to remove access to the data source). Grant (to identify the data source). In a RESTful Application Programming application, in which objects do you bind a CDS view to create a value help? Note: There are 3 correct answers to this question. Data model view. Service definition. Behavior definition. Projection view. Metadata extension. Which of the following integration frameworks have been released for ABAP cloud development? Note: There are 3 correct answers to this question. OData services. Business events. SOAP consumption. Business Add-ins(BAdls). CDS Views. Which patterns raise an exception? Note: There are 3 correct answers to this question. DATA: gv_target TYPE d. CONSTANTS: gco_date TYPE d VALUE '20331233'. gv_target EXACT ( geo_date). DATA: gv_target TYPE c LENGTH 5. CONSTANTS: gco_string TYPE string VALUE 0123456789ABCDEF". gv_target - EXACT (gco_string+5 (6) ). DATA: gv target TYPE p DECIMALS 3. CONSTANTS: gco_int1 TYPE i VALUE 2. gv_target -EXACT #2 / gco_int1 ). DATA: gv_target TYPE string. CONSTANTS: gco_string TYPE LENGTH 16 VALUE 0123456789ABCDEF*. gv_target = EXACT # gco_string+5 (5) ). DATA: gv_target TYPE p DECIMALS 2. CONSTANTS: gco_int1 TYPE i VALUE 3. gv_target EXACT (2 gco_int1). Which of the following are features of Core Data Services? Note: There are 3 correct answers to this question. Associations. Inheritance. Annotations. Structured Query Language (SQL). Delegation. What are some characteristics of secondary keys for internal tables? Note: There are 3 correct answers to this question. Multiple secondary keys are allowed for any kind of internal table. Secondary keys can only be created for standard tables. Secondary keys must be chosen explicitly when you actually read from an internal table. Hashed secondary keys do NOT have to be unique. Sorted secondary keys do NOT have to be unique. Given this code, INTERFACE if1. METHODS m1. ENDINTERFACE. CLASS cl1 DEFINITION. PUBLIC SECTION. interface if1. method m2. ENDCLASS. ... "In method of another class DATA go_if1 TYPE REF TO if1. DATA go_cl1 TYPE REF TO cl1. go_cl1 = NEW #(...). go_if1 = go_cl1. What are valid statements? Note: There are 3 correct answers to this question. Instead of go_cl1 = NEW #() you could use go_if1 - NEW #(...). go_if1 may call method m2 with go if->m2(...). Instead of go cl1 = NEW #(...) you could use go if1 = NEW cl1( ... ). go_if1 may call method m1 with go_if1->m1(). go_cl1 may call method m1 with go_d1->if1-m1(). Given this code , INTERFACE if1. METHODS m1. ENDINTERFACE. CLASS cl1 DEFINITION. ... INTERFACES if1. ENDCLASS. .... CLASS cl2 DEFINITION. ... DATA mo_if1 TYPE REF TO if1. ENDCLASS. What are valid statements? Note: There are 3 correct answers to this question. In class CL2, the interface method is named if1-m1. Class CL2 uses the interface. In class CL1, the interface method is named if-m1. Class CL1 uses the interface. Class CL1 implements the interface. |