Which services build the SAP Java Central Services Instance for AS Java 7.10  and higher?
A. Message Server and EnqueueServer
B. Message Server, Enqueue Server and Gateway Service
C. Message Server, Enqueue Server and ICM
D. Message Server, Enqueue replicated Server and Gateway Service E.

1 Answer

Answer :

B. Message Server, Enqueue Server and Gateway Service

Related questions

Description : Which instances of an SAP system require a running database during their startup? Note: there are 2 correct answered to this question. ? A. Java Central Services Instance B. Additional Application Server Instance C.ABAP Central Services Instance D. Primary Application Server Instance

Last Answer : B. Additional Application Server Instance

Description : Consider an SAP system based on AS ABAP How many monitoring segments are used for the CCMS Monitoring Infrastructure? A. There is one monitoring segment for each host B. There is ... segment for each application server D. There is one monitoring segment for each central services instance

Last Answer : A. There is one monitoring segment for each host

Description : You have changed parameters for AS Java of your SAP system based on AS ABAP+ Java. A restart of AS Java is requiredHow can you stop and start the Java stack without restarting the ABAP ... transaction, ICM Monitors (SMICM) D. Use transaction CCMS Control panel: Display Statuses and alerts (RZ03)

Last Answer : C. Use transaction, ICM Monitors (SMICM)

Description : Your task is to install an additional application server for an SAP system Which rule applies for the installation work? A. The additional application server has to be installed on a ... additional application server has to be identical to the instance number of the primary application server.

Last Answer : A. The additional application server has to be installed on a separated host from the primary application server

Description : Which of the following settings can you make during the installation of an AS ABAP-based SAP ECC 6.06 system? Note: there are 2 correct answered to this question A. The number of clients in the ... C. The master password for some default users in this SAP system D. The ABAP message server port

Last Answer : C. The master password for some default users in this SAP system D. The ABAP message server port

Description : Assuming that you have all required authorizations, which functions can you access in SAP GUI for Java? A. Functions provided by SAP business One B. Functions provided by transactions in AS ... C. Functions provided by SAP NetWeaver Developer Studio D. Functions provided by AS Java SAP systems

Last Answer : B. Functions provided by transactions in AS ABAP based SAP system

Description : During the installation of SAP XSS you have to select the Usage Types that should be installedWhich Usage Types are necessary for the installation of SAP XSS? Note: there are 2 correct answered ... . Utilities Customer E-Services B. Enterprise Portal C. Adobe Document Services D. Self Services

Last Answer : D. Self Services

Description : A company wants to manage job scheduling centrally and has the requirements toexecute job chains across different SAP systems. Which batch scheduling tool do you recommend? A. SAP Central Process ... Process Scheduling (full version) D. The Job Management work center in SAP Solution Manager

Last Answer : C. SAP Central Process Scheduling (full version)

Description : Which interface is used to connect SAP Central Process Scheduling in an SAP ECC system? A. Platform Agent B. XBP C. JXBP D. BW-SCH

Last Answer : B. XBP

Description : You want to provide authorizations to a new user in an SAP system based on ASJava 7.10 or higherHow can you do this with the user management engine (UME)? Note: there are 2 correct answered to this ... assign thisgroup to the user D. Add some actions to a group, then assign this group to the use

Last Answer : B. Add some actions to a role, then assign this role to the user C. Add some actions to a role, assign this role to a group, then assign thisgroup to the user

Description : Which user with administration authorizations is available right after the installation of SAP Solution Manager 7.1 to log A. DDIC B. Administrator C. J2EE_ADMIN D. EARLYWATCH

Last Answer : C. J2EE_ADMIN

Description : On operating system level in the log subdirectory of the transport directory, you find the file DEVI990123 QAS What is this file? A. This is the log for the export of transport request DEVK990123 ... D. This is the data file of transport request DEVI990123 which is to be imported into QAS system

Last Answer : C. This is the log file for the main import of transport request DEVI990123into system SAP

Description : Which post-installations activities are recommended by SAP after the installation of an SAP ECC 6.06 system? Note: there are 2 correct answered to this question A. Restart your SAP system ... of users involved in the implementation project D. Confirm the installation in an SAP Support ticket

Last Answer : A. Restart your SAP system and check logs for errors B. Install a valid license key

Description : What does an authorization profile in an AS ABAP based SAP system contains? A. collection of authorizations B. The user menu C. Profile parameters, such as the password ... (login/password_expiration_time) D. The collection of the authorizations checks that a user has passed successfully

Last Answer : A. collection of authorizations

Description : What are the advantages of activating the automatic Program Global Area (PGA) inSAP system that have an Oracle database? Note: there are 2 correct answered to this question A. Higher system ... sort processes will use more memory for efficient sorting D. Less PGA memory is allocated in advance

Last Answer : A. Higher system performance is gained

Description : What are the prerequisites to assigning Printing Assistant for Landscapes (PAL) printers to a printer group? A. Distribute the printer group to a target system group. B. Check the ... output device using transaction Spool Administration(SPAD) H. Create the output device as a PAL printer

Last Answer : D. Assign the target system to a target system group

Description : What are the options to directly raise an event to trigger an event-dependent job? Note: there are 2 correct answered to this question A. Execute program sapxpg on operating system level B. ... level C. Execute transaction CCMS Control Panel (RZ03) D. Execute the ABAP program BTC_EV,NT_RAISE

Last Answer : D. Execute the ABAP program BTC_EV,NT_RAISE

Description : What are the advantages of using logical spool servers? Note: there are 2 correct answered to this question A. You can create more output devices B. You can balance the load across ... on physical devices D. You can minimize the manual adjustment of output device definitions after the transport

Last Answer : B. You can balance the load across multiple physical spool servers C. You can minimize the load on physical devices

Description : A developer wants to process all transactions in the sequence specified by the application. Which type of Remote Function Call (RFC) implementation do you recommend? A. Background RFC (bgRFC) B. Asynchronous RFC (aRFC) C. Synchronous RFC (sRFC) D. Transactional RFC (tRFC)

Last Answer : D. Transactional RFC (tRFC)

Description : Which information is stored in a monitoring segment of the alert monitoring infrastructure within the Computing Center Management System (CCMS)? Note: there are 2 corrects answered to this questions A. ... B. The coding of data collectors C. Open alerts within CCMS D. Monitoring definitions

Last Answer : A. Current monitoring data of monitored components B. The coding of data collectors

Description : How can you increase the capacity of an Oracle tablespace? Note: there are 2 correct answers in this question A. Resize the existing data file B. Add a new data file to ... compression of backup data using Oracle advanced compression D. Increase the value of the database parameter DB_BLOCK_SIZE

Last Answer : B. Add a new data file to the existing tablespace

Description : Which of the following language is used to build a message server queue in twitter? a) Rubyb) Scala c) Java d) All of the mentioned

Last Answer : Scala

Description : How would you use java & App Engine to write to the file system? a. Disconnect from the internet and Google App Engine automatically writes to the disk. b. Edit the configuration file accordingly c. ... Invoke an instance of Google App Engine within the sandbox and it will then write to the disk.

Last Answer : You cannot write t the file system with the exception of resources files.

Description : How would you use java & App Engine to write to the file system? a. Disconnect from the internet and Google App Engine automatically writes to the disk. b. Edit the configuration file accordingly c. ... Invoke an instance of Google App Engine within the sandbox and it will then write to the disk.

Last Answer : You cannot write t the file system with the exception of resources files.

Description : State true or false for Java Program. i) All class variables are instance variables ii) All protected methods are friendly methods A) i-false, ii-false B) i-false, ii-true

Last Answer : B) i-false, ii-true

Description : Describe instance Of and dot (.) operators in Java with suitable example.

Last Answer : Instance of operator: The java instance of operator is used to test whether the object is an instance of the specified type (class or subclass or interface).  The instance of in java is also known as type ... by this' keyword c.getdata(); where getdata() is a method invoked on object c'. 

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : IGMP isa companion to the ______protocol. A) UDP B) TCP C) ICM D) noneof the above

Last Answer : noneof the above

Description : Which statement best describes the relationship between application, server, and client in a multitenancy environment? A. Single instance of software running on a server and serves one client. B ... clients. D. Multiple instances of software running on multiple servers and serves one client.

Last Answer : Single instance of software running on a server and serves multiple clients.

Description : Which among the following is correct characteristics about proxy server: a) A proxy server may act as a firewall by responding to input packets in the manner of an application while blocking other packets. b) A ... as a proxy on behalf of the network user; d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : Which of the following genres does Hadoop produce? a) Distributed file system b) JAX-RS c) Java Message Service d) Relational Database Management System

Last Answer : Distributed file system

Description : Which of the following technique isused for encapsulation? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets. B. a technique used by protocols in which a lower level ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : a technique used by protocols in which a lower level protocol accepts a message from ahigher level protocol and places it in the data portion of the low level frame

Description : Which of the following technique isused for fragment? A. a technique used inbest-effort delivery systems toavoid endlessly loopingpackets B. a technique used by protocols in which a lower level protocol ... network that cannothandle the originaldatagram size D. All of theabove E. None of the above

Last Answer : one of the pieces that results when an IP gateway divides an IP datagram into smallerpieces for transmission acrossa network that cannothandle the originaldatagram size

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses: a) Circuit Level Gateway b) Proxy Server c) Packet Filter d) None of These

Last Answer : b) Proxy Server

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router

Last Answer : 2 A multi-homed firewall

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : hat information is conveyed by the SSID that is configured on an IoT device? a.the registration server b.he default gateway c.the wireless network d.the home gateway

Last Answer : c.the wireless network

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : Based on PageRank algorithm, Google returns __________ for a query that is parsed for its keywords. a) SEP b) SAP c) SERP d) Business Objects Build

Last Answer : SERP

Description : Based on PageRank algorithm, Google returns __________ for a query that is parsed for its keywords. a) SEP b) SAP c) SERP d) Business Objects Build

Last Answer : SERP

Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above

Last Answer : c. Both of the above

Description : The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ____ Service ready message.. A. 420 B. 320 C. 220 D. 120

Last Answer : C. 220

Description : Can the human brain be replicated artificially?

Last Answer : Not at the moment. I would not care to hazard a guess as to whether one day it will be possible. Oh, all right. I’m going with unlikely.