ExamGecko
Home / SAP / C_ABAPD_2309 / List of questions
Ask Question

SAP C_ABAPD_2309 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Which RESTful Application Programming object can be used to organize the display of fields in an app?

Data model view

Data model view

Metadata extension

Metadata extension

Service definition

Service definition

Projection view

Projection view

Suggested answer: B
Explanation:

A metadata extension is a RESTful Application Programming object that can be used to organize the display of fields in an app. A metadata extension is a CDS view that annotates another CDS view with UI annotations, such as labels, icons, or facets. These annotations define how the data should be presented in the app, such as which fields should be shown on the object page, which fields should be editable, or which fields should be used for filtering or sorting.A metadata extension can also be used to add custom actions or validations to the app12.Reference:1:Refine the Object Page with Annotations | SAP Tutorials2:ABAP RAP : Enabling custom actions with a dialog for additional input fields | SAP Blogs

asked 11/03/2025
Lukasz Malaczek
36 questions

Question 12

Report Export Collapse

Refer to the exhibit.

SAP C_ABAPD_2309 image Question 12 6387725406967231699711

When accessing the subclass instance through go_super, what can you do? Note: There are 2 correct answers to this question.

Access the inherited private components.

Access the inherited private components.

Access the inherited public components.

Access the inherited public components.

Call a subclass specific public method

Call a subclass specific public method

Call inherited public redefined methods.

Call inherited public redefined methods.

Suggested answer: A, B
Explanation:

When accessing the subclass instance through go_super, you can do both of the following:

Access the inherited private components: A subclass inherits all the private attributes and methods of its superclass, unless they are explicitly overridden by the subclass.Therefore, you can access the inherited private components of the superclass through go_super, as long as they are not hidden by other attributes or methods in the subclass12.

Access the inherited public components: A subclass inherits all the public attributes and methods of its superclass, unless they are explicitly overridden by the subclass.Therefore, you can access the inherited public components of the superclass through go_super, as long as they are not hidden by other attributes or methods in the subclass12.

You cannot do any of the following:

Call a subclass specific public method: A subclass does not have any public methods that are not inherited from its superclass.Therefore, you cannot call a subclass specific public method through go_super12.

Call inherited public redefined methods: A subclass does not have any public methods that are redefined from its superclass.Therefore, you cannot call inherited public redefined methods through go_super12.

asked 11/03/2025
Narender B
38 questions

Question 13

Report Export Collapse

Given the following code in an SAP S/4HANA Cloud private edition tenant:

SAP C_ABAPD_2309 image Question 13 6387725406967231699711

The class zcl_demo_class is in a software component with the language version set to 'ABAP Cloud'. The function module ZF1' is in a different software component with the language version set to 'Standard ABAP'. Both the class and function module are customer created.

Regarding line #6, which of the following are valid statements? Note: There are 2 correct answers to this question.

ZF1' can be called only if it is released for cloud development.

ZF1' can be called only if it is released for cloud development.

'ZF1' can be called if a wrapper is created for it and the wrapper itself is released for cloud development.

'ZF1' can be called if a wrapper is created for it and the wrapper itself is released for cloud development.

'ZF1' can be called whether it is released or not for cloud development

'ZF1' can be called whether it is released or not for cloud development

ZF1' can be called if a wrapper is created for it but the wrapper itself is not released for cloud development.

ZF1' can be called if a wrapper is created for it but the wrapper itself is not released for cloud development.

Suggested answer: A, B
Explanation:

The ABAP Cloud Development Model requires that only public SAP APIs and extension points are used to access SAP functionality and data.These APIs and extension points are released by SAP and documented in the SAP API Business Hub1. Customer-created function modules are not part of the public SAP APIs and are not released for cloud development. Therefore, calling a function module directly from an ABAP Cloud class is not allowed and will result in a syntax error. However, there are two possible ways to call a function module indirectly from an ABAP Cloud class:

Create a wrapper class or interface for the function module and release it for cloud development. A wrapper is a class or interface that encapsulates the function module and exposes its functionality through public methods or attributes. The wrapper must be created in a software component with the language version set to ''Standard ABAP'' and must be marked as released for cloud development using the annotation @EndUserText.label.The wrapper can then be called from an ABAP Cloud class using the public methods or attributes2.

Use the ABAP Cloud Connector to call the function module as a remote function call (RFC) from an ABAP Cloud class. The ABAP Cloud Connector is a service that enables the secure and reliable communication between SAP BTP, ABAP environment and on-premise systems. The function module must be exposed as an RFC-enabled function module in the on-premise system and must be registered in the ABAP Cloud Connector. The ABAP Cloud class can then use the class cl_rfc_destination_service to get the destination name and the class cl_abap_system to create a proxy object for the function module.The proxy object can then be used to call the function module3.

asked 11/03/2025
Komalaharshini Basireddygari
48 questions

Question 14

Report Export Collapse

Which restrictions exist for ABAP SQL arithmetic expressions? Note: There are 2 correct answers to this question.

Floating point types and integer types can NOT be used in the same expression.

Floating point types and integer types can NOT be used in the same expression.

The operator/is allowed only in floating point expressions.

The operator/is allowed only in floating point expressions.

Decimal types and integer types can NOT be used in the same expression.

Decimal types and integer types can NOT be used in the same expression.

The operator is allowed only in floating point expressions.

The operator is allowed only in floating point expressions.

Suggested answer: B, D
Explanation:

ABAP SQL arithmetic expressions have different restrictions depending on the data type of the operands. The following are some of the restrictions:

Floating point types and integer types can be used in the same expression, as long as the integer types are cast to floating point types using the cast function. For example,CAST ( num1 AS FLTP ) / CAST ( num2 AS FLTP )is a valid expression, where num1 and num2 are integer types.

The operator / is allowed only in floating point expressions, where both operands have the type FLTP or f. For example,num1 / num2is a valid expression, where num1 and num2 are floating point types. If the operator / is used in an integer expression or a decimal expression, a syntax error occurs.

Decimal types and integer types can be used in the same expression, as long as the expression is a decimal expression. A decimal expression has at least one operand with the type DEC, CURR, or QUAN or p with decimal places. For example,num1 + num2is a valid expression, where num1 is a decimal type and num2 is an integer type.

The operator ** is allowed only in floating point expressions, where both operands have the type FLTP or f. For example,num1 ** num2is a valid expression, where num1 and num2 are floating point types. If the operator ** is used in an integer expression or a decimal expression, a syntax error occurs.

asked 11/03/2025
Daniel Ramirez
52 questions

Question 15

Report Export Collapse

What are valid statements? Note: There are 2 correct answers to this question.

##NEEDED is checked by the syntax checker.

##NEEDED is checked by the syntax checker.

The pragma is not checked by the syntax checker.

The pragma is not checked by the syntax checker.

#EC_NEEDED is not checked by the syntax checker.

#EC_NEEDED is not checked by the syntax checker.

The pseudo-comment is checked by the syntax checker

The pseudo-comment is checked by the syntax checker

Suggested answer: A, B
Explanation:

Both statements are valid in ABAP, but they have different effects on the program.

##NEEDED is a pragma that can be used to hide warnings from the ABAP compiler syntax check. It tells the check tools that a variable or a parameter is needed for further processing, even if it is not used in the current statement.For example, if you declare a variable without assigning any value to it, you can use ##NEEDED to suppress the warning about unused variables12.

The pragma is not checked by the syntax checker means that you can use any pragma to hide any warning from the ABAP compiler syntax check, regardless of its effect on the program logic or performance.For example, if you use ##SHADOW to hide a warning about an obscured function, you can also use it to hide a warning about an invalid character in a string12.

You cannot do any of the following:

#EC_NEEDED is not checked by the syntax checker: This is not a valid statement in ABAP.There is no pseudo-comment with #EC_NEEDED in ABAP3.

The pseudo-comment is checked by the syntax checker: This is false. Pseudo-comments are obsolete and should no longer be used in ABAP.They were replaced by pragmas since SAP NW 7.0 EhP2 (Enhancement Package)4.

asked 11/03/2025
YASSIR EL GHAZY
64 questions

Question 16

Report Export Collapse

Which internal table type allows unique and non-unique keys?

Sorted

Sorted

Hashed

Hashed

Standard

Standard

Suggested answer: C
Explanation:

The internal table type that allows both unique and non-unique keys is the standard table. A standard table has an internal linear index that can be used to access the table entries. The key of a standard table is always non-unique, which means that the table can contain duplicate entries. However, the system does not check the uniqueness of the key when inserting new entries, so the programmer can ensure that the key is unique by using appropriate logic. A standard table can be accessed either by using the table index or the key, but the response time for key access is proportional to the table size.

The other two internal table types, sorted and hashed, do not allow non-unique keys. A sorted table is filled in sorted order according to the defined table key, which must be unique. A sorted table can be accessed either by using the table index or the key, but the response time for key access is logarithmically proportional to the table size. A hashed table can only be accessed by using a unique key, which must be specified when declaring the table. A hashed table has no index, and the response time for key access is constant, regardless of the table size.

asked 11/03/2025
Nelson Alvaro
56 questions

Question 17

Report Export Collapse

In this nested join below in which way is the join evaluated?

SAP C_ABAPD_2309 image Question 17 63877254069687941473830

From the left to the right in the order of the tables: 1. a is joined with b 2. b is joined with c

From the left to the right in the order of the tables: 1. a is joined with b 2. b is joined with c

From the right to the left in the order of the tables: 1. b is joined with c. 2. b is joined with a.

From the right to the left in the order of the tables: 1. b is joined with c. 2. b is joined with a.

From the top to the bottom in the order of the on conditions 1. b is joined with c 2. a is joined with b

From the top to the bottom in the order of the on conditions 1. b is joined with c 2. a is joined with b

From the bottom to the top in the order of the on conditions: 1. a is joined with b 2. b is joined with c

From the bottom to the top in the order of the on conditions: 1. a is joined with b 2. b is joined with c

Suggested answer: C
Explanation:

The nested join is evaluated from the top to the bottom in the order of the ON conditions. This means that the join expression is formed by assigning each ON condition to the directly preceding JOIN from left to right. The join expression can be parenthesized implicitly or explicitly to show the order of evaluation. In this case, the implicit parentheses are as follows:

SELECT * FROM (a INNER JOIN (b INNER JOIN c ON b~c = c~c) ON a~b = b~b)

This means that the first join expression is b INNER JOIN c ON b~c = c~c, which joins the columns of tables b and c based on the condition that b~c equals c~c. The second join expression is a INNER JOIN (b INNER JOIN c ON b~c = c~c) ON a~b = b~b, which joins the columns of table a and the result of the first join expression based on the condition that a~b equals b~b. The final result set contains all combinations of rows from tables a, b, and c that satisfy both join conditions.

asked 11/03/2025
Nikolay Yankov
43 questions

Question 18

Report Export Collapse

Which extensibility type does SAP recommend you use to enhance the existing UI for an SAP Fiori app?

Key user

Key user

Classic

Classic

Side-by-side

Side-by-side

Developer

Developer

Suggested answer: D
Explanation:

According to the SAP clean core extensibility and ABAP cloud topic, SAP recommends using developer extensibility to enhance the existing UI for an SAP Fiori app. Developer extensibility allows you to use the UI adaptation editor in SAP Web IDE to modify the UI layout, add or remove fields, and bind them to the data model. You can also use the SAPUI5 framework to create custom controls, views, and controllers. Developer extensibility is based on the in-app extensibility concept, which means that the extensions are part of the same application and are deployed together with the app. Developer extensibility requires developer skills and access to the source code of the app.Reference: SAP Learning Hub, SAP S/4HANA Cloud Extensibility - In-App Extensibility,SAP Fiori: Extensibility

asked 11/03/2025
terence o oneill
47 questions

Question 19

Report Export Collapse

Image:

SAP C_ABAPD_2309 image Question 19 63877254069687941473830

In the following ABAP SQL code, what are valid case distinctions? Note: There are 2 correct answers to this question.

A)

SAP C_ABAPD_2309 image Question 19 63877254069687941473830

B)

SAP C_ABAPD_2309 image Question 19 63877254069687941473830

C)

SAP C_ABAPD_2309 image Question 19 63877254069687941473830

Option A

Option A

Option B

Option B

Option C

Option C

Suggested answer: A, B
asked 11/03/2025
Andrew Carver
44 questions

Question 20

Report Export Collapse

What are some features of a unique secondary key? Note: There are 2 correct answers to this question.

It is created when a table is filled.

It is created when a table is filled.

It is updated when the modified table is read again.

It is updated when the modified table is read again.

It is created with the first read access of a table.

It is created with the first read access of a table.

It is updated when the table is modified.

It is updated when the table is modified.

Suggested answer: C, D
Explanation:

A unique secondary key is a type of secondary key that ensures that the key combination of all the rows in a table is unique.A unique secondary key has two purposes: firstly, to speed up access to the table, and secondly, to enforce data integrity1.

It is created with the first read access of a table: This is true. A unique secondary key is created when an internal table is filled for the first time using the statement READ TABLE or a similar statement.The system assigns a name and an index to each row of the table based on the key fields23.

It is updated when the modified table is read again: This is false. A unique secondary key does not need to be updated when the internal table content changes, because it already ensures data uniqueness.The system uses a lazy update strategy for non-unique secondary keys, which means that it delays updating them until they are actually accessed23.

You cannot do any of the following:

It is created when a table is filled: This is false.As explained above, a unique secondary key is created only with the first read access of a table23.

It is updated when the modified table is read again: This is false.As explained above, a unique secondary key does not need to be updated when the internal table content changes23.

asked 11/03/2025
NAKAYAMA HIROYUKI
43 questions
Total 81 questions
Go to page: of 9

Related questions