Interview Questions Answers For Abaper

Explain the events ‘GET’ and ‘GETLATE’.   What exactly EXTRACT statement is useful for?

GET and GET LATE is used to fetch records from LDB nodes. Get event trigger when LDB supplies data for the node and GET LATE event is processed when all subroutines has been processed.

EXTRACT statement links the current content of the fields, which were until then included in the field group header resp. field_group via the statement INSERT , to the extract dataset of the program.
e.g.

GET spfli. 
  EXTRACT flight_info. 

GET sflight. 
  EXTRACT flight_date. 

What are differences between At selection-screen and at selection-screen output?

At selection-screen output is triggered when the selection screen is loaded in memory before being displayed.

  The event AT SELECTION-SCREEN is the basic form of a whole series of events that occur while the selection screen is being processed.

The standard selection screen in an executable program or in the logical database linked to it is automatically called between the INITIALIZATION and START-OF-SELECTION events. When you call the selection screen, and when users interact with it, the ABAP runtime environment generates selection screen events, which occur between INITIALIZATION and START-OF-SELECTION.

What are the events?

Initialization, At selection-screen,Start-of-selection,end-of-selection,top-of-page,end-of-page, At line-selection, At user-command,At PF,Get,At New,At LAST,AT END, AT FIRST.

What are the interactive events?

ABAP/4 provides some interactive events on lists such as AT LINE-SELECTION (double click) or AT USER-COMMAND (pressing a button). You can use these events to move through layers of information about individual items in a list.

What is Hide?

Say HIDE f

Stores the contents of f  in relation to the current output line in the HIDE area not necessary for f  to appear on current line
place the HIDE statement immediately after the output statement for f
User selection of a line for which HIDE fields are available fills the variables in the program with the values stored.

How can you write programatically value help to a field without?

Using searchhelp and matchcodes.?

What is RFC?

Remote Function Call.  RFC is an SAP interface protocol. Based on CPI-C, it considerably simplifies the programming of communication processes between systems.
RFCs enable you to call and execute predefined functions in a remote system - or even in the same system.
RFCs manage the communication process, parameter transfer and error handling.

What are client-dependant tables and independent tables?

In SAP systems we have many clients. A client independent table contains data that can be accessed from any client. Generally these tables contain SAP control data, language indicators and transaction codes.

Client Dependent tables contain data which is applicable to one specific client. These tables contain data related to a particular company, for eg. structure of the company, basic commercial data etc..

How to distinguish them?

All client – dep tables have the field MANDT, other don’t.

What are the domains?

Domain is the central object for describing the technical characteristics of an attribute of an business objects. It describes the value range of the field

What are the check tables and value tables?

Value Table - This is maintained at Domain Level.
When ever you create a domain , you can entered allowed values.   For example  you go to Domain   SHKZG - Debit/credit indicator.  Here only allowed values is H or S.  When ever you use this Domain, the system will forces you to enter only these values.   This is a sort of master check . To be maintained as a customization object. This mean that if you want to enter values to this table you have to create a development request & transport the same.

Check table - For example you have Employee master table & Employee Transaction table.  When ever an employee Transacts we need to check whether that employee exists , so we can refer to the employee master table.  This is nothing but a Parent & Child relationship .  Here data can be maintained at client level , no development involved.  As per DBMS what we call foregin key table, is called as check table in SAP.

What are lock objects?

The R/3 System synchronizes simultaneous access of several users to the same data records with a lock mechanism. When interactive transactions are programmed, locks are set and released by calling function modules (see Function Modules for Lock Requests). These function modules are automatically generated from the definition of lock objects in the ABAP Dictionary.

What are the different internal tables ? Explain them?

Standard Internal Tables - Standard tables have a linear index. You can access them using either the index or the key. If you use the key, the response time is in linear relationship to the number of table entries. The key of a standard table is always non-unique, and you may not include any specification for the uniqueness in the table definition.

This table type is particularly appropriate if you want to address individual table entries using the index. This is the quickest way to access table entries. To fill a standard table, append lines using the (APPEND) statement. You should read, modify and delete lines by referring to the index (INDEX option with the relevant ABAP command).  The response time for accessing a standard table is in linear relation to the number of table entries. If you need to use key access, standard tables are appropriate if you can fill and process the table in separate steps. For example, you can fill a standard table by appending records and then sort it. If you then use key access with the binary search option (BINARY), the response time is in logarithmic relation to the number of table entries.

Sorted Internal Tables - Sorted tables are always saved correctly sorted by key. They also have a linear key, and, like standard tables, you can access them using either the table index or the key. When you use the key, the response time is in logarithmic relationship to the number of table entries, since the system uses a binary search. The key of a sorted table can be either unique, or non-unique, and you must specify either UNIQUE or NON-UNIQUE in the table definition.  Standard tables and sorted tables both belong to the generic group index tables.

This table type is particularly suitable if you want the table to be sorted while you are still adding entries to it. You fill the table using the (INSERT) statement, according to the sort sequence defined in the table key. Table entries that do not fit are recognised before they are inserted. The response time for access using the key is in logarithmic relation to the number of table entries, since the system automatically uses a binary search. Sorted tables are appropriate for partially sequential processing in a LOOP, as long as the WHERE condition contains the beginning of the table key.

Hashed Internal Tables - Hashes tables have no internal linear index. You can only access hashed tables by specifying the key. The response time is constant, regardless of the number of table entries, since the search uses a hash algorithm. The key of a hashed table must be unique, and you must specify UNIQUE in the table definition.

This table type is particularly suitable if you want mainly to use key access for table entries. You cannot access hashed tables using the index. When you use key access, the response time remains constant, regardless of the number of table entries. As with database tables, the key of a hashed table is always unique. Hashed tables are therefore a useful way of constructing and
using internal tables that are similar to database tables.

What is runtime analysis?

This runtime analysis tools allows the ABAP/4 programmer to trace the tables used by the SAP dialog/reports programs.  In the Analyze button, you can see four more buttons like:-

Hit List  - Displays the execution time of each statement in the program.
Tables  - Displays the tables accessed during run time.
Group hit list  - Displays the execution time of all the statements and grouping them based on the type of command.  e.g. performs, SQL and internal tables used.
Hirarchy - Displays the execution time of each statement in the actual order in which were executed.  Uses indentation to indicate the level of nesting of statements within subroutines.

Any tables use by the transaction or program can be easily trace with the runtime analysis tools.
Go to transaction SE30
Type in the transaction code you want to analyze.

What are session mothod and call transaction method and  explain about them?
Methods in which you can do a BDC the difference between session and call transaction is Session method.

ABAP

More Abapers Questions:

More Function Module
Functions / SAP Script / ALV

Tables
Database Table

ABAP Books List
ABAP/4 Certification, Programming, Smartforms, Sapscripts and Object Oriented Programming Books

Smart Forms
SAP Smartforms

ABAP Menu:
ABAP Example Hints and Tips

Return to Index:-
SAP ABAP/4 Programming, Basis Administration, Configuration Hints and Tips

(c) www.gotothings.com All material on this site is Copyright.
Every effort is made to ensure the content integrity.  Information used on this site is at your own risk.
All product names are trademarks of their respective companies.  The site www.gotothings.com is in no way affiliated with SAP AG.
Any unauthorised copying or mirroring is prohibited.