Knowledge of SAP ABAP Test oDesk Skill Test Answer

Knowledge of SAP ABAP Test

The concept of visibility of components is well-known in object oriented languages. Which of the following statements are correct with regard to ABAP Objects?

a. A programmer can, but need not, determine the visibility of a compo-nent. The default visibility of a component is PRIVATE.
b. A PRIVATE component of a class can be accessed in all methods of that class.
c. A PROTECTED method METH that is defined in a class SUPER can be overwritten (redefined) in an inherited class SUB.
d. All components of inherited classes are PUBLIC.

A customer has implemented an enhancement for a transaction by using the predefined customer subscreen. The program contains the necessary plausibility checks for the values on the subscreen. However, from time to time, data fields are updated with values that are not allowed.
What do you recommend to solve this problem?

a. Modify all dynpros that use data from the plausibility checks.
b. Implement new plausibility checks for every dynpro change.
c. Implement the same plausibility checks in the User Exit "before save".
d. Implement an additional program to correct the wrong data field values.

What provides guidelines for the development of Web services?

a. Web Service Interoperability (WS-I)
b. Universal Description, Discovery and Integration (UDDI)
c. Web Services Description Language (WSDL)
d. Simple Object Access Protocol ( SOAP )

A customer wants to develop a Web application with Web Dynpro for Java as the front-end technology and a SAP ERP 6.0 system as the backend.
Which type of external interface do you use to generate a Web Dynpro model automatically with a minimum of effort?

a. RFC
b. BAPI
c. Web Service
d. Java Connector

You need to read an ABAP report from a database that is not declared in the ABAP Dictionary.
How do you do this?

a. With open SQL
b. With native SQL
c. With NetWeaver AS ABAP
d. With a remote Java call function

You analyze the complexity of a customer-specific program to determine the expected maintenance efforts.

Which measure do you use?

a. Number of binary decision points (for example, IF-statements)
b. Number of references to other modularization units
c. Number of executable statements
d. Number of methods and interfaces

ABAP has built-in types like C, I, N, STRING, or X. If you use these types for defining data objects, which of the following statements are correct?

a. If you want to define a two-byte integer data object, you use the follow-ing syntax: DATA xyz(2) TYPE i.
b. If you create a data object without explicitly specifying its type, it will become type C with length 1.
c. If you define a data object with type D, two or four digits will be re-served for the year, depending on the user's settings.
d. A data object of type STRING has a fixed length that will automatically be set when the first value is assigned to this data object. This length cannot be adjusted thereafter.

The SAP List Viewer, commonly known as the ALV, is a powerful tool for displaying data. Among the various ALV types, the ALV Grid Control is used for displaying non-hierarchical table data.

a. The ALV Grid Control can be integrated into a list, a selection-screen, and a classical screen (dynpro).
b. By default, a column header will be taken from the data element which is used for specifying the type of the column.
c. When a report with an ALV Grid Control is executed in background processing, the program will terminate abnormally since controls can-not be addressed in background processing.
d. The ALV display is automatically refreshed when the data in the data-base table is changed.

An international retail company needs a customer-specific list in SAP ERP that shows accumulated order values in a selectable currency.

What do you need to know to create this program?

a. Converting factors of source currencies
b. Converting factors of target currency
c. Source currency of the orders
d. Local currency in the system

In a report, you want to define a SELECT-OPTION so_xyz. What are possible ways of defin-ing its type?

a. Refer to a table type directly, using TYPE
b. Refer to a previously defined elementary data object in the same pro-gram, using LIKE
c. Refer to a previously defined elementary data object in the same pro-gram, using FOR
d. Refer to a Dictionary table type with columns SIGN, OPTION, LOW, and HIGH, using FOR

In a customer application, it is necessary to save texts with undefined size.
Which table type do you use to minimize programming efforts?

a. Transparent table with field type TEXT80 for the text
b. Transparent table with field type STRING for the text
c. Cluster table with application key and others fields
d. Pool table with normal construction

Where do you place the language key field in a customer-specific text table to enable generic buffering of this table?

a. Directly before the foreign key of the corresponding customizing table
b. Directly after the foreign key of the corresponding customizing table
c. At the last position of the key fields of the text table
d. The position of the language key field does not matter

Which ABAP language element can you use in Enterprise Services?

a. COMMIT WORK
b. WRITE
c. CALL FUNCTION STARTING NEW TASK
d. DATA itab ... WITH HEADER LINE

Among the most frequently used enhancement concepts in ABAP, you find customer exits. Which of the following statements about customer exits are correct?

a. If a customer exit is not implemented, the program offering this customer exit will dump (terminate abnormally) at runtime.
b. Within one SAP system, a customer exit can have a maximum of one implementation.
c. Within one client of an SAP system, a customer exit can have multiple implementations.
d. Once a customer exit has been implemented in an SAP system, the implementation can be changed, but it cannot be deactivated any more.

What is the main advantage of enhancement packages in SAP Business Suite 7.0?

a. The installation of the packages has to be done in chronological order to make sure the project can use best practices.
b. The installation is independent from the existing installation and all functions of the package will be activated at once.
c. The installation is done via OSS so that the projects themselves do not require administrative knowledge.
d. The installation of a whole package is required, but it is possible to activate only parts of it.

In a new customer SAP GUI dynpro program, particular fields should be visible for authorized users only.
How do you implement this requirement?

a. Set a flag in the appropriate internal table at PBO.
b. Assign those fields to specified user profiles.
c. Delete field content in PBO in case the authorization check was negative.
d. Define transaction variants according to the required authorizations.

Internal tables are used in ABAP to store mass data. Which of the following statements about the relationships between internal tables and database tables are correct?

a. An internal table can be linked to a database table so that the content of the internal table is updated automatically as soon as the content of the database table changes.
b. A data base table XYZ can be used for the definition of an internal table like this: DATA itab TYPE TABLE OF xyz.
c. A data base table in the Dictionary can be defined with reference to an internal table from an ABAP program.
d. If you have a huge number of rows to be dealt with in a program, it might improve the program's performance if you define a database table in the program instead of an internal table.

Where can you check which secondary index of a database table is used in a program?

a. In the system log
b. In the performance trace
c. In the debugger
d. In the application log

There are basically three types of SELECT statements: SELECT SINGLE, SELECT ... ENDSELECT, and SELECT ... INTO TABLE. The SELECT ... ENDSELECT statement is also known as the SELECT loop.
Below, you will find a list of comments about SELECT ... ENDSELECT. Which of them are correct?

a. A work area (structure) is required for the selected rows. This work area can be given explicitly (with INTO) or implicitly (if a TABLES declaration is used).
b. The database will transport individual rows to the database interface.
c. The database will transport blocks of rows to the database interface.
d. The system field sy-tabix counts the number of selected table rows.

You cannot book the business data during processing of an incoming IDoc.
How must the function module react to this problem?

a. Send the IDoc backward
b. Trigger an event for sender
c. Set an error status in the control record
d. Create a Batch Input map

Your transport request is released in system X and imported in system Y.
Which method is used to transport the data from X to Y?

a. File on a file system
b. Database table
c. Remote Function Call
d. File on an IDoc

What are the effects of a COMMIT WORK during program execution?

a. All database and internal table locks are released.
b. The time slice counter is reset to zero.
c. All open database cursors are closed.
d. All memory fields are cleared.

The event concept is vital for selection-screens. Which of the following usages of events make sense for selection-screens?

a. Use INITIALIZATION for setting values for SELECT-OPTIONS.
b. Use AT SELECTION-SCREEN for hiding fields on the selection-screen.
c. Use AT SELECTION-SCREEN OUTPUT for checking user entries.
d. Use AT SELECTION-SCREEN ON pa_car for checking the user entry in the PARAMETER pa_car.

In which case do you decide to create a new ABAP OO class?

a. If it deals with encapsulated data of another class
b. If it mediates between two other classes
c. If it improves maintainability
d. If it only contains methods

How do you avoid semantic mistakes for interface parameters in a customer specific routine?

a. Type all interface parameters.
b. Document all interface parameters.
c. Insert commands by using patterns.
d. Name all interface parameters differently.

Which task do you need to do after printing an Adobe form to avoid a program error?

a. Clear the content of all internal tables.
b. Execute the COMMIT function module.
c. Close the form.
d. Disable the PDF printer.

Your customer wants to migrate from an old legacy system to SAP ERP. The databases in both systems are modified.
What is an advantage using the Legacy System Migration Workbench (LSMW) for the migration?

a. It provides standard interfaces for all fields in a data migration.
b. It provides standard interfaces for all tables in a migration.
c. It supports migration of data and enhanced programs.
d. It supports Batch Input, Call Transaction, and Direct Input to migrate data.

During an upgrade project to SAP NetWeaver 7.0, you are asked for a strategy to convert the implemented classic BAdIs to the new BAdI type.
What do you recommend?

a. Perform the migration of customer BAdIs and BAdIs that are provided by SAP With the available migration tool.
b. Use the procedure for semi-automatic migration because of existing differences between classic and new BAdIs.
c. Perform a completely automated migration of all existing classic BAdIs with the available migration tool.
d. Create new BAdIs because a conversion of classic BAdIs is not foreseen.

What do you need to consider when using dynamic breakpoints?

a. You should set dynamic breakpoints only directly in the Debugger at runtime.
b. You should use dynamic breakpoints only if the program is locked by another user.
c. You can use dynamic breakpoints only up to a limited number without changing the program.
d. If the line where you set a breakpoint already contains a breakpoint, it is deleted.

Your customer wants to use SAP NetWeaver Master Data Management ( MDM ) to cleanse and distribute business partners created in SAP CRM within the existing heterogeneous system environment.
Which standard MDM scenario do you recommend using?

a. Master data consolidation
b. Master data harmonization
c. Central master data management
d. Local master data management

How can you realize a modification free instantiation of objects in a customer-specific ABAP OO development?

a. By programming against interfaces and applying the Factory Design Pattern
b. By inheriting from a main class and applying the Factory Design Pattern
c. By implementing an interface and inheriting from a main class
d. By programming against interfaces and inheriting from a main class


Which of the following is a use case for SAP Solution Manager?

a. Support of Test Data Migration Server (TDMS) for test preparation
b. Support of Visio for process modeling
c. Support of SAP Early Watch Alert for early problem detection
d. Support of SAP Project System (PS) for cost planning

In a program, you need an elementary data object for some calculations. What are possible ways to specify its type?

a. Refer to a domain
b. Refer to a data element
c. Refer to a field of a database table
d. Refer to a field of a search help

You found an error for a field in Process-after-Input (PAI) of a dynpro. You change the value of this field and start PAI again.
Where is the flow control starting in PAI in that case?

a. Always at the first module in the flow control of PAI
b. At the module in the flow control where the error was found
c. At the first module in the flow control, where this field is listed first
d. At the first module of the CHAIN group, where the error was found
How do you characterize customer and user exits?

Which functionality has been introduced with the SAP Enterprise Edition of SAP Solution Manager?

a. Service level reporting
b. Document management with display and print of digitally-signed documents
c. Service desk and root cause analysis
d. Test workbench with integrated Test Data Migration Server (TDMS)

In a customer program, a LOOP statement is processing time consuming database operations on transaction data. The execution of this program takes too long.

How can you optimize the performance of this program?

a. Create new secondary indexes for database tables.
b. Divide the internal table into several smaller tables and call a function module with these tables as parameters in parallel tasks.
c. Divide the internal table into several smaller tables and start a report with these tables as parameters.
d. Expand the internal table with fields which are read from the database within the LOOP.
e. Insert a COMMIT- WORK at the end of the LOOP.

Some ABAP statements require an explicit end, like SELECT loops, FORM definitions, or IF clauses. Which of the following ABAP statements can be nested?

a. One inner SELECT ... ENDSELECT in an outer SELECT ... END-SELECT
b. One inner FORM ... ENDFORM in an outer FORM ... ENDFORM
c. One inner CASE ... ENDCASE in an outer CASE ... ENDCASE
d. One inner CLASS ... ENDCLASS in an outer CLASS ... ENDCLASS

What should you emphasize when presenting the results of a code review to the customer?

a. The risks and effects of identified problems
b. Project plan to implement corrections
c. Recommendations for concrete solutions
d. Implementation of suggested corrections


oDesk CSS 2.0 Skill Test Answer


oDesk CSS 2.0 Test Answer 

Email Etiquette Certification oDesk Skill Test Answer

 Email Etiquette Certification 

How would you abbreviate 'Be Seeing You' in email jargon?
a. BSU
b. BCNU
c. BCINU
d. BCINYU
e. BSNU
When sending an e-mail, why is it a good idea to try and use the cc: field sparingly?
a. The cc: can be confusing since the recipients might not know who is supposed to act on the message.
b. Unless the recipient in the cc: field knows why they are receiving a copy of the message, he or she may not act on the message, but assume it is really only for the main recipient.
c. It can sometimes devalue the main message depending on the context, as it could be seen to depersonalize the main message.
d. All of the above
What does 'scrolling the chat screen' in an internet chat room mean, and is it good or bad netiquette?
a. Looking further down the screen (good netiquette).
b. Scrolling down to follow the conversation as it develops (bad netiquette).
c. Posting multiple, often single letter postings so the chat screen scrolls very fast for all users (bad netiquette).
d. Flicking between multiple chat screen on multiple sites (neither good nor bad netiquette).
e. None of the above
What is the purpose of icon-emotions or so-called 'emoticons' in email communication?
a. They contain important information such as credit card number.
b. They indicate that the email is urgent.
c. They are meant for fun and entertainment value.
d. They act as a signature which is added at the end of each sent mail.
What does 'HTH' mean in an email or on a message board?
a. Happy today happy
b. Hope this helps
c. Help the human
d. Happy to help
e. b and d
Which of the following is the best description of an 'internet troll'?
a. Someone who goes trolling on the internet, moving from place to place without settling anywhere in a chat room or on a board.
b. A funny emoticon made to look like a troll.
c. Another name for a spammer.
d. Someone who participates in a message board or chat with the intention to disrupt it in some way.
Which of the following is the best advice when writing a business e-mail?
a. To use varied italics, colors and special fonts because people like to see them.
b. To keep the information relatively short, precise and always polite, with simple questions relating to what you expect to happen.
c. To make detailed demands in long paragraphs, with the implication of wrongdoing on the part of the receiver.
d. To panic, but then recover, and decide to send the message by regular mail, as this is definitely more secure.
Which of the following is a good statement about time delays between e-mail exchanges?
a. Try to reply within a 24-48 hour window, but allow at least the same amount of time before sending a follow-on e-mail, if not longer.
b. Always reply within 24 hours, and expect the same from someone else.
c. Wait 36 hours before replying to any e-mail, but send a follow-on e-mail within 24 hours if you don't hear anything.
d. Always allow a month for a reply, and return your own received e-mails within three weeks.
When writing an email, it is generally a good idea for your paragraphs to be _________.
a. long
b. short
c. in a huge font making them easier to read
d. always indented
e. None of the above
Which of the following are good tips for creating an impressive webpage?
a. Make the content informative and entertaining, but easy to read
b. Imitate other appealing sites in terms of their visual and textual content, but do not plagiarize.
c. Test all the links to make sure they work and connect to their intended new page.
d. Edit, edit, edit to ensure there are no mistakes in the content, as factual, grammar, typographical and spelling errors look unprofessional.
e. All of the above
What does the phrase 'lurk before you leap' commonly mean on internet sites?
a. That you should set up a virtual online presence and scare people when they log-in.
b. That you should familiarize yourself with a website's contents — its purpose, its FAQ, its community — before making a contribution.
c. a and b
d. That you should contribute quickly before anyone discovers that you are an unwelcome presence, or only tenously connected to the site and its online community.
Which of the following are important differences between face-to-face meetings and online information?
a. You are virtually invisible online, so you can get away with a lot more.
b. Your face cannot be seen, so it is harder to convey your thoughts and easier to be misunderstood online.
c. Written communication should always be more polished and formal than real life spoken communication.
d. While cursing is okay in real life, it is strictly prohibited online.
If you are chatting with someone via the instant messenger and text 'BRB', what have you said?
a. Been Ready Buddy
b. Been Really Busy
c. Being Really Busy
d. Be Right Back
Which of the following is the best technique for sending a large e-mail attachment?
a. Just attach it and send it.
b. Email the other party directly first and make sure their connection can handle a large download.
c. Try and break it up into several smaller downloads, or 'zip' the file if possible.
d. Send part of it, and wait to see if they request the remaining part.
e. b and c
What does 'spamming' mean, and is it good or bad netiquette?
a. Sending online presents or 'spam' to your co-workers and friends (good netiquette).
b. Sending unsolicited e-mails or communications to people online (bad netiquette).
c. Both a and b, depending on the context.
d. Same as 'flaming' (good netiquette).
e. Same as 'e-mail jousting' (bad netiquette).
What is a business 'welcome page' and how can it be useful?
a. It's not: welcome pages are always distracting and take too long to load.
b. It can give an impression of professionalism, as well as introduce the company brand, logo and overall interests.
c. It's the same as the home page.
d. It's the same as the goodbye page.
e. None of the above
Which of the following could be considered as not being 'virtual events,' so you may wish to respond using a more direct reply or regular mail?
a. Weddings, funerals, engagements, birthdays.
b. After hours get-togethers.
c. Casual meetings related to school or work.
d. A local prize draw.
e. A coffee morning at a nearby school.
What is a very useful last thing to do before sending out any e-mail?
a. Read the e-mail through for spelling and grammatical errors, to simplify the message if possible, and to check the recipient's e-mail address.
b. Nothing, the quicker you send it, the quicker they will receive it.
c. Copy the e-mail at least twice into a word document, as a double precaution.
d. Check the time, so you can remember when you sent it, in case they call.
e. All of the above
How often is it sensible to use 'reply all' when replying to an e-mail?
a. As often as possible, the more people know the information the better.
b. Always, as e-mails should have at least two recipients at all times.
c. Only if the information is really relevant to everyone on the list, otherwise keep 'reply all' to a minimum.
d. You should 'reply all' about twice as often as you simply 'reply'.
e. None of the above
On a social networking site, which of the following is important to consider — in a personal way - when uploading photographs?
a. How many images you can upload as fast as possible.
b. Consider the feelings and reputation of the person whose image you are uploading, especially if the image is compromising in some way.
c. Whether it is clear that you are the one uploading the images or not.
d. None of the above
Which of the following is not a good practice for reacting to virus hoaxes and chain letters?
a. Forwarding them to your friends, as often advised by the e-mail hoax itself.
b. Discarding or deleting them immediately.
c. Considering them, and allowing them to send to your entire contacts list, for other people to decide about their authenticity.
d. Printing them out and sending hard copies to a local internet watchdog or awareness group.
Why should you not type in all caps when writing an email?
a. Because it can be difficult to read.
b. Because it takes up more room and makes the email longer.
c. Because it is considered 'yelling'.
d. Because it is tough on your keyboard.
e. a and c
What is the better solution than using bold or italic to emphasize meaning when e-mailing or posting online?
a. Use capitals
b. Use color
c. Use carefully chosen words and phrases, so that the meaning is clear and not ambiguous and unlikely to cause misunderstandings.
d. Draw a picture and insert it around the text.
e. None of the above
What do the abbreviations 'FWIW' and 'FYI' stand for?
a. For What It's Worth, For Your Information
b. For Why It's War, For Your Info
c. For Whom It Worries, Forget Your Instructor
d. Future Wear Inside Walls, Fool Your Insides
e. For Whom It Worries, Fax Your Information
What does it mean when you type an e-mail in all capitals?
a. The e-mail is important
b. The e-mail is an emergency
c. The e-mail is classified information
d. The effect is that you are shouting
e. b and c
Which of the following is the best response to sending a message that you didn't intend to send, or sent to the wrong recipient?
a. Make a request for the e-mail to be recalled or sent back to you.
b. Race over to the recipient's computer, especially if he or she lives or works locally, and delete the message manually.
c. Send a follow-up message explaining that the previous message was a mistake, with a brief apology and explaining that the message can be ignored.
d. Jump up and down in frustration and tear your hair.
e. All of the above
What should you do if you do not want to type your name at the end of every email you send?
a. Only sign emails which you send to business associates.
b. Do not sign at all as people know who the email is from, courtesy your return email address.
c. Include the 'from' information in the subject line so you can save the time of 'signing' the email.
d. Create a signature that will get automatically attached to every email you send.
What does it mean to 'respect somebody else's bandwidth'?
a. To measure the width of the desktop PC in comparison to a laptop of the same brand.
b. To open doors for them to fit through, a reference specifically to the real rather than the virtual world.
c. To be conscious of how much storage space you are controlling in any given communication, since everyone only has limited space.
d. To allow them two communications for every single communication of your own.
e. None of the above
Which of the following best reflects a so-called 'Golden Rule' of etiquette?
a. Spam your friends.
b. Remember the human (remember that a real person is receiving the message).
c. Sometimes act friendly in chat and emails.
d. Only flame your friends by accident.
e. All of the above
Which of the following is the best explanation of 'netiquette'?
a. Electronic netball practice.
b. An abbreviation for 'internet etiquette' or even 'ethics on the net,' the correct way to interact in an online setting.
c. Networking expertise, especially when off-line.
d. Online chatrooms for sophisticated Mac and PC users.
What is the best way to treat 'spam' or unsolicited e-mails?
a. Do not reply to them.
b. Delete them.
c. Transfer them to your spam folder.
d. Ignore them (if you notice them, as they are usually transfered to your spam folder automatically).
e. All of the above
What is the correct way to address someone online, if you are unsure of how he or she would like to be addressed?
a. Use their first name, it is always the friendliest option.
b. Use their last name, such as Mr. Jones or Ms. Jones.
c. Use their full name, with their first name in parentheses afterwards.
d. Use Dear X to demonstrate your uncertainty, and they will probably correct you.
What are vCards and why are they sometimes distracting or difficult for the recipient?
a. vCards are online invitation cards, but the recipient often does not want to attend the event.
b. vCards are e-mail that copy in other members of your contacts list automatically, which is often not desirable.
c. vCards are electronic business cards, but they often take the form of an e-mail attachment, therefore making every e-mail look like it has an attachment.
d. vCards are online stationery cards used for a variety of events, and therefore business and recreational events can get confused.
e. None of the above
What is the most important aspect of writing content for a blog, either as a main posting or as a comment on someone else's blog?
a. Always make your posts accurate and truthful (as well as entertaining) especially if they reflect on your reputation as someone with an online presence.
b. Make it long and detailed, and occasionally bend the truth a little for the sake of impact, even if you are discovered.
c. Make the blog colorful, or make your posting in bold, italic or in capitals, for emphasis.
d. All of the above
A common online symbol, what is the correct 'emoticon' for a regular 'smiley face' from the list below?
a. ;-)
b. :-)
c. :))
d. (-- :
e. (-: