UDEMY Flashcards
@AccessControl.authorizationCheck: #NOT_REQUIRED
DEFINE VIEW ENTITY demo_flight_info_join AS
SELECT FROM scarr AS a
LEFT OUTER JOIN scounter AS b
LEFT OUTER JOIN sairport AS c
ON c.id = b.airport
ON a.carrid = b.carrid
{
a.carrid AS carrier_id,
c.id AS airport_id,
b.countnum AS counter_number
}
choose correct answer
scounter will be joined to sairport first and the result will be joined with scarr.
To enhance the existing UI for an SAP Fiori app, Which extensibility type does SAP recommend you use?
Key user
Which of the following string functions are predicate functions?
There are 2 correct answers.
- matches()
- contains_any_of()
What is true for using the expression itab_1 = corresponding #( itab_2 )? There are 2 correct answers.
- Fields with the same name and the same type will be copied from itab_2 to itab_1.
- itab_1 and itab_2 must have at least one field name in common.
What are the advantages of using a field symbol for internal table row access?
There are 2 are answers.
- Using a field symbol is faster than using a work area.
- A MODIFY statement to write changed contents back to the table is not required.
Which patterns raise an exception?
There are 3 correct answers.
- DATA: lv_target TYPE p DECIMALS 2.
CONSTANTS: lc_con TYPE i VALUE 3.
lv_target = EXACT (2 / lc_con).
- DATA: lv_target TYPE d.
CONSTANTS: lc_date TYPE d VALUE ‘20331233’.
lv_target = EXACT ( lc_date).
- DATA: lv_target TYPE c LENGTH 5.
CONSTANTS: lc_con TYPE string VALUE “0123456789ABCDEF”.
lv_target = EXACT ( lc_con + 5 (6) ).
What are some characteristics of secondary keys for internal tables?
There are 3 correct answers.
- Multiple secondary keys are allowed for any kind of internal table.
- Sorted secondary keys do NOT have to be unique.
- Secondary keys must be chosen explicitly when you actually read from an internal table.
Which of the following results in faster access to internal tables?
There are 3 correct answers.
- In a sorted internal table, specifying the primary key partially from the left without gaps.
- In a hashed internal table, specifying the primary key completely.
- In a sorted internal table, specifying the primary key completely.
DATA lo_sup TYPE REF TO cl_sup.
DATA lo_sub TYPE REF TO cl_sub.
lo_sub = NEW #( ).
lo_sup = lo_sub.
Here cl_sup is a superclass of cl_sub, when accessing the subclass instance through lo_sup, what can you do?
There are 2 correct answers.
- Call inherited public redefined methods.
- Access the inherited public components.
IF <cond>.</cond>
RAISE EXCEPTION TYPE zexptn
EXPORTING
param_1 = value_1
param_2 = value_2
previous = value_3
ENDIF>
- The code creates an exception object and raises an exception.
- zexptn is a dictionary structure, and param1 and param2 are same structure.
INTERFACE intf_1.
METHODS m1.
ENDINTERFACE.
CLASS cls_1 DEFINITION.
INTERFACES intf_1
ENDCLASS.
CLASS cls_2 DEFINITION.
DATA: lo_intf TYPE REF TO intf_1.
ENDCLASS.
There are 3 correct answers.
- Class cls_2 uses the interface.
- In class cls_2, the interface method is named lo_intf->m1
- Class cls_1 implements the interface.