You are on page 1of 17

TAW12

ABAP Workbench Concepts Part I & II

1. Data and functions are kept separate in the procedural programming model.
True X False
2. What does multiple instantiations mean?

• Creating and managing runtime instances


• Implementing relationships between classes
• Creating instances of different classes
• Sending messages directly to specific objects by triggering events
3. Which of the following is a simplification of complex relationships in the real world?

• Inheritance
• Abstraction
• Encapsulation
• Event control
4. Which kind of UML diagram pays particular attention to the sequence in which objects relate to
each other?

• Class
• Behavior
• Component
• Object
5. You can group all characteristics and behaviors of similar objects into one central class.
True X False
6. The CLASS statement can be nested, that is, you can define a class within a class.
True False
7. Which one of the following syntax elements is used to define static attributes?

• CLASS-DATA
• DATA
• LIKE
8. Which of the following options is used to create an object?

• CREATE OBJECT ref_name


• APPEND ref_name
• CLASS ref_name
9. You must create and address objects using reference variables.
True False
10. During program runtime, you create discrete objects (instances) in memory for an existing class.
This process is called instantiation.
True X False
11. When calling a static method from within the class, you can omit the class name.
True X False
12. In which of the following expressions can functional methods be called directly?

• IF
• COMPUTE
• MOVE
• WHILE
13. You can describe methods that have a _________ parameter as functional methods.

• EXPORTING
• CHANGING
• RETURNING
14. You have to define RETURNING parameters using the VALUE addition, that is they must be pass by
value.
True X False
15. The _____________ is a special instance method in a class.

• constructor
• function
• attributes
16. The instance constructor is automatically called at runtime with the CREATE OBJECT statement.
True X False
17.Which of the following points are true about the static constructor?

• Each class has not more than one static constructor.


• The static constructor must be defined in the private area.
• The static constructor’s signature can have importing parameters or exceptions.
• The static constructor must be called explicitly from the class.
18. The instance constructor’s signature can have importing parameters or exceptions.
True X False
19. Which of the following are the characteristics of inheritance?

• Common components only exist once in the superclass


• Components in the subclasses are available in all superclasses
• Subclasses contain extensions or changes
• Subclasses are not dependent on superclasses
20. A superclass is a generalization of its subclasses.
True X False
21. Suppose that you have a class X that inherits from class Y. After an up-cast a reference variable
that is statically typed TYPE REF TOY points to an instance of class X. What components of class X can
you access with this reference variable?

• Components defined in class X


• Components inherited from class Y
• Components redefined in class X
• Components defined in class X and redefined in its subclasses
22. When objects from different classes react differently to the same method calls, this is known as
__________.

• objects
• events
• polymorphism
• inheritance
23. A typical use for ________ assignments is to prepare for generic access.

• events
• upcast
• methods
• downcast
24. Which of the following is used to assign a superclass reference to a subclass reference?

• Widening Cast
• Narrowing Cast
• Redefinition
25. Which of the following is the downcast assignment operator?

• =
• <>
• ?=
• =?
26. Suppose that you have the same class X that inherits from class Y. After a down-cast, a reference
variable that is statically typed TYPE REF TO X points to an instance of class X. Which of the following
components of class X can you access with this reference variable?

• Components defined in class X


• Components inherited from class Y
• Components redefined in class X
• Components defined in class X and redefined in its subclasses
26. What are the advantages of correctly using class hierarchies?

• Centralized maintenance
• Safe and generic method of access
• Semantics preserved
• Intended use of inherited components
27. You can access interface components only by using an object reference.
True False
28. Which of the following is the main strength of interfaces?

• Events
• Inheritance
• Polymorphism
29. ?= is the down-cast assignment operator.
True X False
30. Suppose a reference variable that is typed to an interface contains an instance reference of a class
that implements this interface and you copy this to a reference variable that is typed to the class
(down-cast). Which of the following components can you access with this reference variable?

• The components of the interface


• The components from the class that are not defined on the interface
• All components of the class
• The components of the interface for which alias names have been defined
31. Which of the following strongly resembles inheritance?

• Interface
• Class
• Method
32. Interfaces can include other interfaces.
True X False
33. Which of the following cannot be defined as interface components?

• Attributes
• Methods
• Events
• Classes
34. Which of the following statements is used to trigger events?

• CLASS-EVENTS
• RAISE EVENT
• EVENTS
• FOR EVENTS
35. You can trigger static events only in static methods.
True X False
36. Which of the following is specified by the definition of the handler method?

• Which method will react to which event of which class


• Which instances will perform the reaction
37. Handler methods are registered using the SET HANDLER statement. Registration is only active at
program runtime.
True X False
38. Which visibility section would an event need to be defined in, to ensure that it can only be handled
in the class itself and its subclasses?

• Public
• Protected
• Private
39. You can only use local classes or interfaces within the same program in which they are defined and
implemented.
True X False
40. The naming convention for SAP Standard Global Interfaces is ZIF_ or YIF_.
True False
41. Which of the following buttons in Class Builder is used to override an inherited method?

• CONSTRUCTOR
• Redefine
• Implementation
42. Local types of the global class are encapsulated and cannot be accessed from outside.
True X False
43. The ABAP List Viewer (ALV) Grid Control is a tool that you can use to display nonhierarchical lists in
a standardized form.
True X False
44. Container controls provide the technical connection between the screen and the application
control.
True X False
45. To create a handler object for an event, we must first define a ____________.

• class
• structure
• screen
• attribute
46. A handler method can be either a class method (static method) or an instance method of an
object.
True X False
47. With a Business Add-In (BADI), an SAP application program provides the enhancement option
through an interface method.
True X False
48. An object of the BADI adapter class is instantiated by the call of the static method GET_INSTANCE
of the class CL_EXITHANDLER.
True X False
49. To implement a Business Add-In (BADI), the BADI definition name must be determined.
True X False
50. The code of a BADI implementation is stored in a __________ of an automatically generated
customer class.

• method
• structure
• object
51. Which of the following statements is used to raise class-based exceptions?

• EXPORTING
• RAISE EXCEPTION
• CREATE OBJECT
• CATCH
52. Which of the following blocks is used to catch and handle exceptions?

• IMPORTING….RETURNING
• METHOD…. ENDMETHOD
• TRY … ENDTRY
• TRY...CATCH...ENDTRY
53. A class-based exception can only be handled if the statement that raised it is enclosed in a
TRY-ENDTRY control structure.
True X False
54. TRY-ENDTRY structures can be nested to any depth.
True X False
55. You can specify only two exception classes to the CATCH statement.
True False
56. If an exception is raised, the name of the exception class is displayed in the __________ field in
debugging mode.

• exception raised
• last exception object
• watchpoint
• layout
57. Which of the following syntax additions is used to propagate an exception from a procedure?

• CATCH
• RAISING
• METHODS
• FORM
58. For subclasses of ____________ the corresponding exceptions cannot be propagated explicitly
using the RAISING addition.

• CX_STATIC_CHECK
• CX_NO_CHECK
• CX_DYNAMIC_CHECK
59. Which of the following are ways of handling an exception?

• Continue program
• Remove the cause of error
• Do not propagate an exception
• Call method CX_SYSTEM_HANDLE
60.Which of the following is used to jump back to the TRY statement?

• RETRY
• CATCH
• TRY-ENTRY
• RAISE
61.Which of the following is a prerequisite for using the RESUME statement?

• The exception has to be caught with addition BEFORE UNWIND.


• The exception has to be caught with addition AFTER UNWIND.
• The exception has to be propagated with addition RESUMABLE( ).
• The exception has to be raised with addition RESUMABLE.
62. Static _____________ cannot be abstract because they cannot be redefined.

• classes
• structures
• methods
• attributes
63. You can prevent a class from being inherited from by defining it as final.
True X False
64. An association means that at runtime an instance of one class stores references to objects of
another class.
True X False
65. If the visibility of the instance constructor is changed from private to protected, the visibility is
extended to all of its subclasses.
True X False
66. Which of the following are the advantages of a factory method?

• A factory method can have coding that is executed before the actual instantiation.
• A class can have more than one factory method with different implementations and signatures.
• Factory methods cannot be used to administrate the instances of a class within the class itself.
• A factory method cannot be used to instantiate one of the subclasses rather than the class itself.
67. Which of the following concepts is used to provide a class access to the private components of the
other class?

• Singleton
• Friendship
• Interface
• Casting
68. Shared memory is a memory area on an application server that the ABAP programs running on
that server can access.
True X False
69. Which of the following methods is available for the application to release the read lock when
working with shared objects?

• DETACH_COMMIT
• OUTDATED
• DETACH
70. You can assign Field symbols to data objects dynamically at runtime.
True X False
71. If a field symbol is assigned to a data object, all accesses you make to the field symbol are made
directly to that data object.
True X False
72. What is the variant of the ASSIGN statement that provides access to structure components
dynamically?

• ASSIGN COMPONENT ... TO STRUCTURE ...


• ASSIGN COMPONENT ... OF STRUCTURE ...
• ASSIGN COMPONENT ...WITH STRUCTURE ...
• ASSIGN COMPONENT ... IN STRUCTURE ...
73. When you assign values between two reference variables with different types, you perform what
is called a cast assignment.
True X False
74. Which of the following classes can be instantiated and used to describe specific types?

• CL_ABAP_ELEMDESCR
• CL_ABAP_INTFDESCR
• CL_ABAP_STRUCTDESCR
• CL_ABAP_TYPEDESCRI
75. The description classes for object types provide navigation methods for determining the details of
a used type.
True X False
76. Class CL_ABAP_CLASSDESCR contains public attributes that are typed as internal tables.
True X False
77. To generate objects at runtime, the static type of the reference variable must be compatible with
the class.
True X False
78. Which of the following is the statement that creates a data object dynamically at runtime?

• CREATE OBJECT
• CREATE DATA
• ASSIGN
• GET REFERENCE OF
79.With the HANDLE addition, the CREATE DATA statement creates a data object whose data type is
described by an RTTI type object.
True X False
80. Which of the following techniques used to adapt SAP standard software involve the use of the
ABAP Workbench?

• Customization
• Personalization
• Enhancements
• Modifications
81. Which of the following enhancement technologies offer menu exits?

• Customer Exits
• Business Transaction Events
• Business Add-Ins
• Explicit Enhancements
82. Which of the following are characteristics of append structures?

• You can use multiple append structures with a single SAP table.
• You can use append structures as normal structures in programs.
• You can use one append structure in multiple tables.
• Customers can create an append structure for an SAP table without SAP preparation.
83. Which of the following are characteristics of Customizing Includes?

• Customizing Includes are already integrated into SAP tables by SAP.


• Customizing Includes may be linked with source code or screen exits provided by SAP for
processing or displaying the fields of the table.
• Customizing Includes can be used in pool and cluster tables.
• Customizing Includes ensure consistency throughout the tables and structures affected.
84. Which of the following steps are required in the procedure to create an SAP enhancement?

• Define necessary components


• Assign components to SAP enhancements
• Document the enhancement project
• Activate the enhancement project
85. Which of the following steps are required in the procedure to create a customer enhancement
project?

• Start project management


• Name your enhancement project
• Transport the project
• Enter a short text description in the project attributes
86. Which of the following includes contains the events belonging to the X function group?

• LX...F01
• LX...E01
• LX...O01
• LX...I01
87. Which of the following is the reserved section of a main screen to allow the user to display
additional information or enter additional data?

• Normal screens
• Subscreen areas
• Program screens
• Classical screens
88. Which of the following components can be part of a Business Add-In (BADI)?

• Program enhancements
• Screen enhancements
• Text enhancements
• Menu enhancements
89. If you want to implement a filter-dependent Business Add-In, you will need an implementation for
each filter value that is relevant.
True X False
90. What are the reasons for introducing the new Business Add-In (BADI) technology?

• Improve performance
• Implement additional functions
• Improve scalability
• Integrate into the new Enhancement Framework
91. New Business Add-Ins (BADIs) always belong to enhancement spots and are managed by these
spots.
True X False
92. For each Business Add-In (BADI) that you want to use in an enhancement spot, you need to create
a BADI implementation.
True X False
93. For which of the following repository objects must you create an implementation in order to be
able to use enhancement points or sections?

• Implicit enhancement section


• Explicit enhancement point
• Enhancement spot
94. What is the syntax used to identify an explicit enhancement point?

• ENHANCEMENT-SECTION
• ENHANCEMENT-POINT
• END-ENHANCEMENT SECTION
95. It is possible to have more than one implementation for an enhancement point, each one
belonging to different enhancement implementations.
True X False
96. Which of the following is the repository object that stores explicit enhancement points and
sections?

• Conflict-dissolution or switch
• Enhancement spot
• Enhancement implementation
97. An implicit enhancement point provides you with the option to insert additional source code at
certain points in SAP source code.
True X False
98. The Enhancement Framework allows you to enhance methods in SAP classes.
True X False
99. What do you have to create to be able to use implicit enhancement points and options?

• Explicit enhancement point


• Enhancement implementation
• Explicit enhancement section
100. Overwrite methods replace the implementation of the original method.
True X False
101. Identify the implicit enhancements available in local SAP classes.

• At the beginning and end of each method.


• At the end of the implementation block.
• Option to create additional importing parameters.
102. What are some of the benefits of SSCR (SAP Software Change Registration) for registering
modifications?

• Quick error resolution


• Simplification of upgrades
• Dependable operation
• SSCR key given to an object, needs to be given again and again for each modification
103. Which of the following tools are supported by the Modification Assistant?

• ABAP Editor
• Screen Painter
• Menu Builder
• ABAP Dictionary
104. Which of the following are reasons why SAP provided user exits?

• Provide enhancements for Sales and Distribution applications.


• Provide enhancements to prevent modifications.
• Enable multiple independent implementations.
• Ensure smooth upgrades.
105. During modification adjustment, which transactions can you use to compare the old and new
versions of ABAP Repository objects?

• SPDD
• SSCR
• SPAU
106. Web Dynpro applications are built using declarative programming techniques based on the
Model View Controller programming model.
True X False
107. Multiple views can be displayed in the view container area at a time.
True False
108. Which of the following statements are true?

• The outbound plug of a window can be connected to any inbound plug of embedded views
• Each view can be embedded in multiple windows.
• The outbound plug of a view can be connected to any inbound plug of the embedding window.
• Navigation between windows of the same component is possible.
109. The context and the methods defined in a controller are private unless another controller
explicitly declares the usage of this controller.
True X False
110. Which of the following hook methods exist in a Component Controller?

• wddobeforenavigation( )
• wddopostprocessing( )
• wddoonopen( )
• wddoapplicationstatechange( )
111. A context always has a parent node known as the context root node. What kind of properties
does this context root node have?

• Fixed properties and it cannot be deleted


• No fixed properties and it cannot be deleted
• Fixed properties and it can be deleted
• Some fixed properties and it can be deleted
112. What happens when the cardinality of a node equals 1..1 or 1..n?

• The element with a random index is created automatically when the node is instantiated
• The element with index 1 is created automatically when the node is instantiated
• The element with index 1 is deleted automatically when the node is instantiated
113. Which of the following are true about internal mapping?

• Only the mapped node lies within the boundaries of one component
• Only the mapping origin node lies within the boundaries of one component
• Both the mapped node and the mapping origin node lie within the boundaries of one component
• Both the mapped node and the mapping origin node lie outside the boundaries of one
component
114. A UI element is any graphical entity that occupies a position within a view layout.
True X False
115. When the layout preview is visible, the view designer displays the UI elements grouped in
different categories. Which of the following categories contains elements that are used to display
texts or to enter literals?

• Text
• Action
• Selection
• Complex
116. You use the view editor within the custom controller for editing the view layout.
True False
117. Which of the following is used to supply a value to the UI element that has a property bound to a
context node or attribute?

• Context data
• Corresponding UI element
• Web Dynpro view controller
• Controller hook method
118. To control the behavior of a UI element programmatically, create a context attribute and bind a
property of the UI element to this context attribute. What property of the context attribute must
match the property of the UI Element?

• Data type
• Status
• Data binding
119. Which of the following display is allowed for the Table UI Element?

• Two-dimensional
• One-dimensional
• Three-dimensional
• Four-dimensional
120. What is the default selection cardinality for any context node?

• 0
• 1
• 1..1
• 0..1
121. Which of the following are hook methods found in Web Dynpro component controllers?

• WDDOINIT
• WDDOBEFOREACTION
• WDDOEXIT
• WDDOONCLOSE
122. Which of the following types of method can be defined in a Web Dynpro controller?

• Supply Functions
• Event Handlers
• Static Methods
123. On the Attributes tab page, additional attributes can be defined for the related controller.
True X False
124. What do you need to access a context element or a context attribute?

• A declaration of a binding relationship


• A reference to the related context node
• A definition of variables that can be bound to UI elements and that can be easily exchanged
between different controllers
• A reference to the node to be altered by the supply function
125. Which node method should you call to access the data sets related to multiple table rows
selected by the user?

• get_selected_elements( )
• get_value_attribute( )
• get_static_attributes( )
• get_child_node( )
126. To create an element that can be added to a certain context node, you have to determine the
reference to this node first. How can you do this?

• By calling the get_child_node( ) method through the standard attribute WD_CONTEXT.


• By calling the set_static_attributes( ) method
• By using the PARENT_ELEMENTparameter
• By instantiating CL_WD_CONTEXT_NODE

You might also like