Which lock mode do you use if you want lock data can be edited only by one user and protects the locked objects against all types of other transactions?

Which lock mode do you use if you want lock data can be edited only by one user and protects the locked objects against all types of other transactions?A . Read locks (lock mode Shored)B . Optimistic locks (lock mode Optimistic)C . Write locks (lock mode Exclusive)D . Enhanced write...

January 13, 2021 No Comments READ MORE +

Concerning some (CCMS) monitoring terminology, which of the following statements are correct? (Choose three)

Concerning some (CCMS) monitoring terminology, which of the following statements are correct? (Choose three)A . Each MTE can only be used in exactly one customer-defined monitor definition at a time.B . Each monitoring attribute is assigned to exactly one monitoring object.C . A monitoring attribute is also a monitoring tree...

January 13, 2021 No Comments READ MORE +

Which of the programming languages listed below are implemented platform-independently?

Which of the programming languages listed below are implemented platform-independently?A . C/C++B . ABAPC . JavaD . FortranView AnswerAnswer: B

January 13, 2021 No Comments READ MORE +

What is the transaction code to delete a client? (Please choose one correct answer)

What is the transaction code to delete a client? (Please choose one correct answer)A . SCC4B . SCC3C . SCC5D . SCC9E . SCC1View AnswerAnswer: C

January 13, 2021 No Comments READ MORE +

When an external program triggers a background processing event, which operating system executable of the SAP system is used in triggering the event?

When an external program triggers a background processing event, which operating system executable of the SAP system is used in triggering the event?A . sapevent_launcherB . sapevtC . rfcView AnswerAnswer: B

January 12, 2021 No Comments READ MORE +

Which of the following steps do you need to perform when installing an agent?

Which of the following steps do you need to perform when installing an agent?A . Create the CSMCONF fileB . Start agent registration in the Visual AdministratorC . Set up an RFC connection to the central monitoring system before the installationD . Create the CSMADMIN userView AnswerAnswer: A

January 12, 2021 No Comments READ MORE +

Which Typical Access Technology will use SAP ERP (with SAP ECC)? Please choose one correct answer

Which Typical Access Technology will use SAP ERP (with SAP ECC)? Please choose one correct answerA . SAP GUI for Windows (GUI = Graphical User Interface)B . Browser-based interface (different browsers possible) BEx Analyzer (additionally requires Excel on the front-end)C . SAP NetWeaver Business ClientD . Browser-based interface (different browsers...

January 11, 2021 No Comments READ MORE +

To Configure Import Server which of the following parameters Required?

To Configure Import Server which of the following parameters Required?A . Repository NameB . ODBC Data SourceC . Server AddressD . Data ServiceView AnswerAnswer: D

January 11, 2021 No Comments READ MORE +

What is default value for all?

With the start profile parameter service/hostname you can also determine the IP address / host name to which the Web service port should be connected, to limit accessibility in the network. What is default value for all?A . /255.255.255.0B . /192.168.1.0C . /192.168.1.1D . /0.0.0.0View AnswerAnswer: D

January 11, 2021 No Comments READ MORE +

Which Typical Access Technology will use SAP NetWeaver Bl 7.0? Please choose one correct answer

Which Typical Access Technology will use SAP NetWeaver Bl 7.0? Please choose one correct answerA . Browser-based interface (different browsers possible) BEx Analyzer (additionally requires Excel on the front-end)B . Browser-based interface (different browsers possible)C . SAP NetWeaver Business ClientD . SAP GUI for Windows (GUI = Graphical User Interface)View...

January 10, 2021 No Comments READ MORE +