Table T1 wants to ensure that the key field t1-fielda entered is valid against a field t2-fielda in table T2. Which is the foreign key table? a) T1 b) T2 c) T3 from the dictionary d) Cannot be determined Note: I think the answer is A. What do you think. Please answer only if you are very sure. Else pls ignore.
1 3388108. Identify the one addition that is not part of the interface of a method a) Importing b) Result c) Exception d) Returning NOTE: I think the answer is B. Please comment if you are sure with your answer
2173What is the Effect of not Typing Formal parameters in a Form? a) Conversion always occurs b) Conversion never occurs c) Forms are more flexible but prone to a short dump if conversion does not work d) No effect e) Forms are less flexible and are guaranteed no chance of a run time error Note: Please answer only if you are very sure. Else pls ignore.
1 4891Refer to the following Code. What is the value of sy-fdpos and sy-subrc after the search is executed? Data: mystring type c value 'ARAMCO'. Search mystring for 'X' a) sy-fdpos = 0 and sy-subrc = 0 b) sy-fdpos = 0 and sy-subrc = 4 c) sy-fdpos = 4 and sy-subrc = 0 d) sy-fdpos = 4 and sy-subrc = 4 Note: Which is correct B or D ? I am just confused between B or D. If you are very sure then please reply.
1 5183Post New SAP Labs Certifications AllOther Interview Questions
What is the use of setprotoent(3) Function?
list of methods that is used to document the requirements of a software.
How do you handle two sessions in Informatica
What is drda ?
Can you define a udf?
What is the difference between TFTP and FTP application layer protocols?
What is intrinsic objects in asp.net?
Is null or empty in c#?
What is the vision and mission of your life?
How can I execute dynamic sql with ase in sybase?
How can we create a hyperlink in html?
How do I remove a .exe virus from windows 10?
How will you delete a file using node?
details about managerial effectiveness
What are the methods used to control the corrosion? : Electrochemistry Corrosion