differences between version 4.7 and ecc 5.0
Answer Posted / sathish kumar
ECC6.0
Need Solution amanger Key to installing the ECC 6.0
Called as netweaver componenent, have both ABAP + Java Stack
Supports both unicode and non unique code
Having Web application servere (ABAP+Java)
Fm like ws_upload, ws_downlaod are obselete and obsolete fm are found in Rodir
Ecc is very strict in case of ECP error and slin observes catching the run time error
if uou are doing uniocode conversion, you need to check transaction uccheck for unicode errors and need to replace the obselete statement like < > => =<etc.
more towords oops and developer friendly
new debugger
new enhancement frame work is introduced
efficient to use adobe form
built with netweaver platform with solution manager
Has a new option for badi, to create your own badis and implement
you have new comcept called implicit and explicit plugin
web dynpro accessible in se80
SAP ERP 4.6
NO solution manager key is required
Have only ABAP Stack
Supports NOn Unique Code
no issue with 4.6 but will give dump.
regards,
Sathish kumar
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
How is the command suppress-dialog useful?
How are the function code handles in flow logic?
What is an Open Item in SAP? How will you find an Open Item in SAP?
What is the significance of the screen number ‘0’?
what is the purpose of BAPI BAPI_CUSTMATINFO_GETLIST What is input and output of this BAPI.
I created a field and entered the field type, when I double clicked the field type to define the domain; it is asking for an ACCESS KEY, I am not changing any SAP defined tables, working on a user defined table.
Explain the session method? : abap bdc
How do you execute the payroll
Can we make use of flow logic control key words in abap/4 and vice-versa?
What are plan versions used for? : sap abap hr
What happens if a function module runs in an update task?
What is web dynpro for abap?
What are the client dependant objects in abap / sap?
What is the lock object?
How the transaction that are programmed by the user can be protected?