Which lock mode do you use if you want lock data can be edited only by one user and protects the locked objects against all types of other transactions?

Which lock mode do you use if you want lock data can be edited only by one user and protects the locked objects against all types of other transactions?A . Read locks (lock mode Shored)B . Optimistic locks (lock mode Optimistic)C . Write locks (lock mode Exclusive)D . Enhanced write locks (lock mode exclusive...

Continue reading

Concerning some (CCMS) monitoring terminology, which of the following statements are correct? (Choose three)

Concerning some (CCMS) monitoring terminology, which of the following statements are correct? (Choose three)A . Each MTE can only be used in exactly one customer-defined monitor definition at a time.B . Each monitoring attribute is assigned to exactly one monitoring object.C . A monitoring attribute is also a monitoring tree element (MTE).D . A...

Continue reading

Which Typical Access Technology will use SAP ERP (with SAP ECC)? Please choose one correct answer

Which Typical Access Technology will use SAP ERP (with SAP ECC)? Please choose one correct answerA . SAP GUI for Windows (GUI = Graphical User Interface)B . Browser-based interface (different browsers possible) BEx Analyzer (additionally requires Excel on the front-end)C . SAP NetWeaver Business ClientD . Browser-based interface (different browsers possible) View Answer Answer:...

Continue reading

Which Typical Access Technology will use SAP NetWeaver Bl 7.0? Please choose one correct answer

Which Typical Access Technology will use SAP NetWeaver Bl 7.0? Please choose one correct answerA . Browser-based interface (different browsers possible) BEx Analyzer (additionally requires Excel on the front-end)B . Browser-based interface (different browsers possible)C . SAP NetWeaver Business ClientD . SAP GUI for Windows (GUI = Graphical User Interface) View Answer Answer: C...

Continue reading