SAP Web AS ABAP cont..

 


What profile parameter is used to configure the number of dialog work processes of the respective instance?


Profile parameter rdisp/wp_no_dia is used to configure the number of dialog work processes. Tcode RZ10 is used to set the values of profile parameters. Tcode RZ11 is used to display the value which is already configured. Transaction code RZ11 cannot be used for maintaining profile parameter values. It is a display only transaction code. RSPFPAR can also be used to view the profile parameters. For maintaining profile parameter values, we use transaction code RZ10.


How to determine the instance (SAP Web Application Server) in which the user is logged on?


SAP Web AS ABAP application servers can be determined using the menu path System->Status->Server name
Tcode SM51 is used in SAP Web AS ABAP to get the list of all the application servers that are configured on a particular host. Transaction code AL08 can be used to find out the application server in which the user is currently logged in. Transaction code AL08 gives the list of all the currently logged in users in an SAP System. This is a display only transaction code. There is one more transaction code – SM04, which provides the list of users currently logged into a particular application server. This tcode can also be used to log off users from the server.


What are the components of a Work Process?

Components of a Work Process are:
(1) Screen Processor
(2) ABAP Interpreter
(3) Database Interface
(4) Internal Memory
(5) Task Handler


What part of an SAP system is responsible for converting OPEN SQL to Native SQL?

Database Interface is responsible for converting OPEN SQL to Native SQL.


Give some examples of client specific data.

Examples of client specific data include application data, user data (like user master records, authorizations etc), client specific customizing data like company codes etc.


Programs are client-specific or cross-client data?

Programs are cross-client data.



 

You might be interested in Introduction to R/3 Security