Thursday, April 28, 2022

SAP Certified Development Associate - ABAP with SAP NetWeaver 7.50 Part -4


 

Question 26

Ques:- You need to create a piece of code that can be used by multiple programs. Which of the following

techniques for modul arization does SAP recommend? (2 Correct)

1. A function module in a function group

2. A method in a global class

3. A subroutine in a program

4. A method in a local class

Correct Answer : 1,2

Question 27

Ques:- Which of the following is correct?

1. The screen attributes can be modified in the PROCESS BEFORE OUTPUT event block.

2. None of the above.

3. The screen attributes can be modified in the PROCESS AFTER INPUT event block.

4. The screen attributes can be modified in the PROCESS BEFORE OUTPUT and PROCESS AFTER

INPUT event blocks.

Correct Answer : 1

Question 28

Ques:- How can you maintain documentation for input fields on your screen?

1. Define text tables for the underlying structure.

2. Add documentation to the SCREEN table at PROCESS BEFORE OUTPUT (PBO).

3. Add documentation to the SCREEN table at PROCESS AFTER INPUT (PAI).

4. Add documentation to the underlying data element.

Correct Answer : 4

Question 29

Ques:- What scheduling technique is used by the ABAP debugger dispatcher for processing user

requests?

1. Shortest First

2. Multiple Queue

3. Round Robin

4. First in, First out

Correct Answer : 4

Question 30

Ques:- How many kinds of internal tables are supported in the ABAP language?

1. 2

2. 3

3. 1

4. 5

Correct Answer : 2

Question 31

Ques:- Identify the key capabilities of SAP NetWeaver. (3 Correct)

1. Service-oriented architecture (SOA) middleware

2. Security and Identity management

3. Business intelligence

4. Customer Relationship Management

5. Supply Chain Management

Correct Answer : 1,2,3

Question 32

Ques:- Java is an object-oriented and a platform-independent programming language.

1. TRUE

2. FALSE

Correct Answer : 1

Question 33

Ques:- In a three-tier client-server configuration, the application layer processes can be spread across

multiple hosts.

1. TRUE

2. FALSE

Correct Answer : 1

Question 34

Ques:- What are the advantages of a three-tier client-server configuration as compared with a single-tier

or two-tier configuration? (2 Correct)

1. Simpler scalability

2. Simpler administration

3. Load balancing

4. None of the above

Correct Answer : 1,3

Question 35

Ques:- Which of the following is true about the key areas of SAP products? (3 Correct)

1. On premise

2. On mobile

3. On demand

4. On request

5. On device

Correct Answer : 1,3,5

Question 36

Ques:- SAP Business All-in-One is the ideal solution for small and midsize companies with stable

processes and that want to use a preconfigured system from SAP.

1. TRUE

2. FALSE

Correct Answer : 1

Question 37

Ques:- Which of the following stores the user data in SAP systems ?

1. User record

2. User master record

3. Stored record

Correct Answer : 2

Question 38

Ques:- The following strings are valid entries in the command field in the SAP Easy Access screen. (4

Correct)

1. /nend

2. /nex

3. ?SM04

4. /nsm04

5. From SAP Easy Access: SM04

Correct Answer : 1,2,4,5

Question 39

Ques:- Identify the statements that accurately describe a client in an SAP system. (2 Correct)

1. A client represents a completely independent business entity.

2. A client has its own database.

3. A client corresponds to a customer.

4. A client may represent an entire company.

Correct Answer : 1,4

Question 40

Ques:- Which of the following personalization options are available in the SAP GUI. (3 Correct)

1. You can change the font size in the SAP GUI within a certain range.

2. You can display system messages in a dialog box.

3. You can vary the size of input fields.

4. You can deactivate the display of pictures in the SAP GUI.

5. You can integrate your picture into the SAP Easy Access screen.

Correct Answer : 1,2,4

Question 41

Ques:- Which of the following is a true statement? (2 Correct)

1. A standard table should always have a unique key.

2. A standard table should always have a multiple key.

3. A hashed table should always have a unique table key.

4. A sorted table can have a unique or a non-unique key.

Correct Answer : 3,4

Question 42

Ques:- In which program types can you create dialog screens? (3 Correct)

1. Interface pool

2. Module pool

3. Executable program

4. Function group

5. Class pool

Correct Answer : 2,3,4

Question 43

Ques:- Using the screen system table, what can you modify through a LOOP AT SCREEN … ENDLOOP

construct?

1. Screen status

2. Function code of buttons

3. Attributes of screen elements

4. Values of screen elements

Correct Answer : 3

Question 44

Ques:- Which of the following are incorrect statements? (2 Correct)

1. TYPES: Str TYPE STRING LENGTH 20.

2. TYPES: carrid_ty LIKE spfli-s-carr_id.

3. TYPES: date_ty TYPE D LENGTH 10.

4. TYPES: werks TYPE C LENGTH 4.

Correct Answer : 1,3

Question 45

Ques:- Which parameter types can be used in the signature of a functional method? (2 Correct)

1. CHANGING

2. IMPORTING

3. EXPORTING

4. RETURNING

Correct Answer : 2,4

Question 46

Ques:- Can you search for suitable classic Business Add-Ins(BAdIs)? (2 Correct)

1. Search for suitable entries in the relevant component in the Implementation Guide (IMG)

2. Use the SAP menu Tools -> ABAP Workbench -> Development -> Business Object Builder

3. Search in an application program for the method GET_INSTANCE of class CL_EXITHANDLER

4. Search in the Repository Information System and choose Enhancements - >Customer Exits

Correct Answer : 1,3

Question 47

Ques:- Which of the following are valid control level changes within a loop over an internal table? (2

Correct)

1. SUM

2. COLLECT

3. LAST

4. END of

Correct Answer : 3,4

Question 48

Ques:- You want to display a dialog box in your ABAP program. Which statement do you use?

1. SET SCREEN 200.

2. CALL SCREEN 200.

3. CALL SCREEN 200 STARTING AT 5 5.

4. WINDOW 200 STARTING AT 5 5.

Correct Answer : 3

Question 49

Ques:- What is the allowed length of the ABAP Dictionary data type DF16_DEC?

1. The allowed length is 16 digits.

2. The allowed length is between 0 and 16 digits.

3. The allowed length is between 1 and 15 digits.

4. The allowed length is between 0 and 15 digits.

Correct Answer : 3

Question 50

Ques:- When is an ENDSELECT not required for a SELECT? (3 Correct)

1. When you do a SELECT SINGLE

2. When the FROM is a view

3. When you specify into a table

4. When you specify a join of tables

5. When you specify appending a table

Correct Answer : 1,3,5

 



I hope it's helpful for you. If you have any queries, don't hesitate to contact me.

Name : Muhammad Sahal Qasim
E-mail : s.m.sahal789@gmail.com

Thank you.

Wednesday, April 27, 2022

SAP Certified Development Associate - ABAP with SAP NetWeaver 7.50 Part -3




 Question 1 

Ques:- Which statement ends a screen sequence and starts from initial screen?

1.       CALL SCREEN

2.       LEAVE SCREEN

3.       SET SCREEN 0

4.       LEAVE TO SCREEN

Correct Answer : 3
Question 2 

Ques:- Which of the following predefined data types are character types? (3 Correct)

1.       N

2.       D

3.       X

4.       T

5.       P

Correct Answer : 1,2,4
Question 3 

Ques:- Your colleague has asked you to analyze and ABAP program that does not behave correctly when a button is pressed on the initial screen. You want to start Debugger when the button is pressed so that you can perform your analysis. What do you type in the command field?

1.       /n

2.       /hx

3.       /h

4.       Jdbg

Correct Answer : 3
Question 4 

Ques:- What is the event block that all of your code changes belongs to if you do not explicitly code any event blocks in an executable program?

1.       AT SELECTION-SCREEN OUTPUT

2.       LOAD-OF-PROGRAM

3.       INITIALIZATION

4.       START-OF-SELECTION

Correct Answer : 4

Question 5 

Ques:- Which of the following rules must you follow when creating subscreens? (2 Correct)

1.       Subscreens CANNOT have an AT EXIT-COMMAND module.

2.       Subscreens can have a dialog module containing SET PF-STATUS.

3.       Subscreens can call other subscreens.

4.       Subscreens CANNOT have a field of type OK.

Correct Answer : 1,4

Question 6 

Ques:- What options do you have when setting a watchpoint? (2 Correct)

1.       Stop at any change of a specific variable.

2.       Stop at predefined conditions for all variables.

3.       Stop at any change of all variables.

4.       Stop at predefined conditions for a specific variable.

Correct Answer : 1,4

Question 7 

Ques:- What is the difference between SAP Basis and SAP NetWeaver?

1.       All versions of SAP NetWeaver require the use of Unicode.

2.       There is no difference; the name change was driven by marketing alone.

3.       All versions of SAP NetWeaver include the ability to handle HTTP requests.

4.       All versions of SAP NetWeaver require the use of UTF-8.

Correct Answer : 3

Question 8 

Ques:- A view can only be displayed in which circumstances?

1.       It cannot always be displayed.

2.       It contains an inbound and outbound plug.

3.       It has been embedded in a window.

4.       It can always be displayed.

Correct Answer : 3

Question 9 

Ques:- When is a foreign key check performed on an input/output field?

1.       If the field refers to the dictionary field for which a search is defined

2.       If the field refers to the dictionary field for which a append search is defined

3.       If the field refers to the dictionary field for which a check table is defined

4.       If the field refers to the dictionary field for which a value help is defined

Correct Answer : 3

Question 10 

Ques:- Which message types behave the same regardless of the context in which they are called? (2 Correct)

1.       X

2.       S

3.       A

4.       W

5.       E

6.       I

Correct Answer : 1,3

Question 11 

Ques:- In a subclass, you want to redefine a method of the super class. Which of the following conditions must be fulfilled? (2 Correct)

1.       The subclass method has a lower visibility than the super class method

2.       The superclass method is an instance method

3.       The subclass method has same visibility as the super class method

4.       The super class method is abstract

Correct Answer : 2,3

Question 12 

Ques:- What is the default length of the type C data type?

1.       10

2.       1

3.       1–65535

4.       100

Correct Answer : 2

Question 13 

Ques:- You want to translate dynamic text in a web dynpro. From which abstract class should you inherit?

1.       CL_WD_COMPONENT_ASSISTANCE

2.       CL_WD_CONTEXT_SERVICES

3.       CL_WD_CONFIGURATION_MODEL

4.       CL_WD_COMPONENT_SERVICES

Correct Answer : 1

Question 14 

Ques:- Which of the following statements dynamically changes the data type of field z1?

1.       Move z1 to

2.       Unassign

3.       Assign z1 to casting

4.       Assign z1 to

Correct Answer : 3

Question 15 

Ques:- Which of the following can you do with the ABAP debugger? (3 Correct)

1.       Analyze memory usage.

2.       Analyze SQL traces.

3.       Change source code.

4.       Compare data objects.

5.       Analyze internal tables

Correct Answer : 1,4,5

Question 16 

Ques:- A work process…

1.       Stays linked toa screen through the dispatcher.

2.       Becomes inactive while waiting for a user.

3.       Becomes active while waiting for a user.

4.       Uses a common memory area called shared memory.

Correct Answer : 4

Question 17 

Ques:- Where can you define global data types that are visible system-wide? (3 Correct)

1.       In a global interface

2.       In the ABAP Dictionary

3.       In a method of a global class

4.       In a function module

5.       In a global class

Correct Answer : 1,2,5

Question 18 

Ques:- A structure has enhancement category 3, can be enhanced (character-type). Which set of elementary types is allowed for the new fields?

1.       F,I,P,X

2.       D,I,string,T

3.       C,D,N,T

4.       C,D,N,X

Correct Answer : 3

Question 19 

Ques:- Which of the following is a true statement? (2 Correct)

1.       An access key is required to implement business add-ins.

2.       An access key is required to implement an implicit enhancement point.

3.       An access key is required to enhance an SAP application using a user exit.

4.       An access key is required to modify SAP repository objects.

Correct Answer : 3,4

Question 20 

Ques:- What can be part of the signature of an instance constructor? (2 Correct)

1.       Export parameters

2.       Exceptions

3.       Changing parameters

4.       Import parameters

Correct Answer : 2,4

Question 21 

Ques:- How do you use a sorted internal table? (2 Correct)

1.       You need to specify a key in the table declaration

2.       You can read the records by index or key

3.       You can resort the table with SORT

4.       You use APPEND to insert records at the correct position

Correct Answer : 1,2

Question 22 

Ques:- You enhance an SAP standard global class by defining a post-method for an SAP method. The original SAP method has an EXPORT parameter named PARM1. Which parameters does the postmethod have?

1.       An OMPORT parameter named PARM1

2.       A RETURNING parameter named PARM1

3.       A CHANGING parameter named PARM1

4.       An EXPORT parameter named PARM1

Correct Answer : 3

Question 23 

Ques:- Function modules provide which types of parameters? (4 Correct)

1.       Output

2.       Exceptions

3.       Input/output (changing)

4.       Input

5.       Return values

Correct Answer : 1,2,3,4

Question 24 

Ques:- Which statement is true?

1.       A database LUW must be placed without an SAP LUW.

2.       A database LUW cannot be placed within an SAP LUW.

3.       An SAP LUW must be placed within a database LUW.

4.       A database LUW must be placed within an SAP LUW.

Correct Answer : 3

Question 25 

Ques:- When are the changes to the VB* table transferred to the database?

1.       When an update function module is executed

2.       When the enqueue work process is executed

3.       When the update work process is executed

4.       When the main program is executed

Correct Answer : 3



I hope it's helpful for you. If you have any queries, don't hesitate to contact me.

Name : Muhammad Sahal Qasim
E-mail : s.m.sahal789@gmail.com
Thank you.

Wednesday, April 13, 2022

DBMS CRYPTO is a PLSQL function that allows you to encrypt or decrypt sensitive data



Transparent Data Encryption was introduced in Oracle 10g, and it is concerned with storing data in data files that are physically encrypted. The data is always created and retrieved by the users in plain text format. Users give plain text when data is generated, but Oracle automatically turns that plain text into encrypted form and saves it in the data files, and whenever users access that data, Oracle decrypts the data and displays it to the users, as described in the next section. The users have total transparency into the encryption and decryption processes. They are completely unaware that the data has been encrypted. The whole purpose of transparent encryption is to keep the sensitive information contained inside the data files secure.

Encrypting sensitive data for users or apps is very different from Transparent Data Encryption and has no resemblance to it. If you want a particular column in the table to be encrypted when it is shown to the users, you will have to encrypt it manually at the time of data entry. And if you want to make use of that information, you'll have to decode it first. For example, Oracle includes utilities to execute encryption and decryption. For example, DBMS OBFUSCATION KIT is available in Oracle 8i and 9i. This package was deprecated in favor of DBMS CRYPTO in Oracle 10g, which is simpler to use and has a greater number of cryptographic methods.

This tutorial will make use of a "users" table that has the field "password." When the password field is queried, it is expected to provide an encrypted value; however, when the application requests the true password value (decrypted), the field should return the genuine password value (decrypted).

$ sqlplus scott/tiger

 

CREATE TABLE users (

   userid       NUMBER,

   username     VARCHAR2(30),

   userlocation VARCHAR2(30),

   password     VARCHAR2(200),

   CONSTRAINT users_pk PRIMARY KEY (userid)

);

 

insert into users

values (1,'JAMES','TEXAS','james123');

 

insert into users

values (2,'JONES','TEXAS','jones001');

 

insert into users

values (3,'ALLEN','TEXAS','allen789');

 

commit;

 

exit;

 

We just had to build the database and a few plain text passwords to get started. Develop an encryption/decryption method for the password field at this point in time.

 

$ sqlplus / as sysdba
 
CREATE OR REPLACE PACKAGE enc_dec
AS
   FUNCTION encrypt (p_plainText VARCHAR2) RETURN RAW DETERMINISTIC;
   FUNCTION decrypt (p_encryptedText RAW) RETURN VARCHAR2 DETERMINISTIC;
END;
/
 
CREATE OR REPLACE PACKAGE BODY enc_dec
AS
     encryption_type    PLS_INTEGER := DBMS_CRYPTO.ENCRYPT_DES
                                     + DBMS_CRYPTO.CHAIN_CBC
                                     + DBMS_CRYPTO.PAD_PKCS5;
     /*
       ENCRYPT_DES is the encryption algorithem. Data Encryption Standard. Block cipher. 
       Uses key length of 56 bits.
       CHAIN_CBC Cipher Block Chaining. Plaintext is XORed with the previous ciphertext 
       block before it is encrypted.
       PAD_PKCS5 Provides padding which complies with the PKCS #5: Password-Based 
       Cryptography Standard
     */
     encryption_key     RAW (32) := UTL_RAW.cast_to_raw('MyEncryptionKey');
     -- The encryption key for DES algorithem, should be 8 bytes or more.
 
     FUNCTION encrypt (p_plainText VARCHAR2) RETURN RAW DETERMINISTIC
     IS
        encrypted_raw      RAW (2000);
     BEGIN
        encrypted_raw := DBMS_CRYPTO.ENCRYPT
        (
           src => UTL_RAW.CAST_TO_RAW (p_plainText),
           typ => encryption_type,
           key => encryption_key
        );
       RETURN encrypted_raw;
     END encrypt;
     FUNCTION decrypt (p_encryptedText RAW) RETURN VARCHAR2 DETERMINISTIC
     IS
        decrypted_raw      RAW (2000);
     BEGIN
        decrypted_raw := DBMS_CRYPTO.DECRYPT
        (
            src => p_encryptedText,
            typ => encryption_type,
            key => encryption_key
        );
        RETURN (UTL_RAW.CAST_TO_VARCHAR2 (decrypted_raw));
     END decrypt;
END;
/
 
grant execute on enc_dec to scott;
create public synonym enc_dec for sys.enc_dec;
 
exit;
 

In order to provide the same results for the same input parameters, the functions "encrypt" and "decrypt" must use the same encryption technique and key. For instance, if you pass in the value ABC, the function will always return the same encrypted value. As a result, it makes a great deal of sense to write these functions in deterministic form. Once a deterministic function has been created and is being executed a second time against the same input parameters, Oracle does not actually execute the function the second time, but instead uses the results of its previous execution against the same input parameters, resulting in a significant increase in overall performance.

Due to the fact that the encryption or decryption of VARCHAR2 does not function directly with DBMS CRYPTO, I changed it to RAW before encrypting it.

See the following link for additional information on cryptographic algorithms: DBMS CRYPTO Algorithms.

 
$ sqlplus scott/tiger
 
select enc_dec.encrypt('Hello World') encrypted 
from dual;
 
ENCRYPTED
----------------------------------
89738046FA0CFDD2581198FBF98DE2C5
 
/* A simple value encrypted using the package we just created. */
 
select enc_dec.decrypt('89738046FA0CFDD2581198FBF98DE2C5') decrypted
from dual;
 
DECRYPTED
------------------
Hello World
 
/* The same value decrypted using the package we just created. */
 
column username format a10
column userlocation format a10
column password format a10
select * from users;
 
    USERID USERNAME   USERLOCATI PASSWORD
---------- ---------- ---------- ----------
         1 JAMES      TEXAS      james123
         2 JONES      TEXAS      jones001
         3 ALLEN      TEXAS      allen789
 
/* We can see Password data in plain text from above. */
 
SQL> update users
  2  set password = enc_dec.encrypt (password);
 
3 rows updated.
 
SQL> commit;
 
Commit complete.
 
/* 
   We just encrypted the password data using the algorithm and key specified in the 
   package ENC_DEC.
   We also need to make sure any newly created record has Password value encrypted using 
   the package ENC_DEC.
*/
 
column password format a32
select * from users;
 
    USERID USERNAME   USERLOCATI PASSWORD
---------- ---------- ---------- --------------------------------
         1 JAMES      TEXAS      D705C2186A64B1A6FF3B6E6220746731
         2 JONES      TEXAS      98DDCC4DAB5F13140C8D657D381E05FC
         3 ALLEN      TEXAS      D9A656AD83B7ADC7443D6BECD173715E
 
/* All existing passwords are now encrypted */
 
SQL> insert into users
  2  values (4,'SCOTT','TEXAS',enc_dec.encrypt('scott456'));
 
1 row created.
 
SQL> commit;
 
Commit complete.
 
SQL> select * from users;
 
    USERID USERNAME   USERLOCATI PASSWORD
---------- ---------- ---------- --------------------------------
         1 JAMES      TEXAS      D705C2186A64B1A6FF3B6E6220746731
         2 JONES      TEXAS      98DDCC4DAB5F13140C8D657D381E05FC
         3 ALLEN      TEXAS      D9A656AD83B7ADC7443D6BECD173715E
         4 SCOTT      TEXAS      41D69256E23E7A3D2AFEFF2E5C082FFD
 
/* The newly created record of user SCOTT has its password encrypted. */
 
column decrypted_password format a10
column encrypted_password format a32
select username ,                                              
       enc_dec.decrypt (password) decrypted_password,
       password encrypted_password
from users;
 
USERNAME   DECRYPTED_ ENCRYPTED_PASSWORD
---------- ---------- --------------------------------
JAMES      james123   D705C2186A64B1A6FF3B6E6220746731
JONES      jones001   98DDCC4DAB5F13140C8D657D381E05FC
ALLEN      allen789   D9A656AD83B7ADC7443D6BECD173715E
SCOTT      scott456   41D69256E23E7A3D2AFEFF2E5C082FFD
 
SQL> grant select on users to hr;
 
Grant succeeded.
 

Users who have EXECUTE access to the ENC DEC package are the only ones who can view the encrypted values contained inside the package. The data can only be decrypted using the same key and algorithm that was used to encrypt it in the first place. Since all of these password values must be decrypted using the KEY and ALGORITHEM given in the package ENC DEC, there is no other way to decode them.

HR has been allowed access to the SELECT function on the table "users." Check out the results of his querying of data from users' tables to see what he discovers.

 
SQL> conn hr/hr
Connected.
column username format a10
column userlocation format a10
column password format a32
select * from scott.users;
 
    USERID USERNAME   USERLOCATI PASSWORD
---------- ---------- ---------- --------------------------------
         1 JAMES      TEXAS      D705C2186A64B1A6FF3B6E6220746731
         2 JONES      TEXAS      98DDCC4DAB5F13140C8D657D381E05FC
         3 ALLEN      TEXAS      D9A656AD83B7ADC7443D6BECD173715E
         4 SCOTT      TEXAS      41D69256E23E7A3D2AFEFF2E5C082FFD
 
SQL> select enc_dec.decrypt(password) from scott.users;
select enc_dec.decrypt(password) from scott.users
       *
ERROR at line 1:
ORA-00904: : invalid identifier
 
 
SQL> desc enc_dec
ERROR:
ORA-04043: object "SYS"."ENC_DEC" does not exist
 
 

Because the user HR does not have access to the ENC DEC package, he will not be able to see the encrypted data.

Keep your encrypted data secure from hackers by using a password.

Keep your encryption algorithm and key secret is the most important thing you can do. If they are made public, anybody may decode your encrypted data and see it in its entirety.. When using the ENC DEC package, the key and algorithm are both kept inside the ENC DEC package.

 
 
encryption_key     RAW (32) := UTL_RAW.cast_to_raw('MyEncryptionKey');
encryption_type    PLS_INTEGER := DBMS_CRYPTO.ENCRYPT_DES
                                + DBMS_CRYPTO.CHAIN_CBC
                                + DBMS_CRYPTO.PAD_PKCS5;
 
 

Anyone with DBA credentials has the ability to see the source code of the package and leak out the encryption technique and key used by the package. Before we can generate or ship the package with the application, we must wrap the code in order to conceal the content that is in the code. Here's how to encapsulate your PL/SQL code so that it is not visible to users.

I placed the CREATE PACKAGE statements in a file called create enc dec package.sql and then ran the wrap tool to wrap the code into a new file named create enc dec package.wrp. I then ran the wrap utility to wrap the code into a new file named create enc dec package.wrp.

 
$ wrap iname=create_enc_dec_package.sql oname=create_enc_dec_package.wrp
 
PL/SQL Wrapper: Release 10.2.0.1.0- Production on Sun Aug 15 06:44:32 2010
 
Copyright (c) 1993, 2004, Oracle.  All rights reserved.
 
Processing create_enc_dec_package.sql to create_enc_dec_package.wrp
 
 

Check out the contents of this new file create enc dec package.wrp to see what it contains.

 
$ more create_enc_dec_package.wrp
CREATE OR REPLACE PACKAGE enc_dec wrapped 
a000000
1
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
9
a6 b2
ceYtyd1wwstfJ/3xbNlo4sobVxYwg0xHAMusaS/pOPYrUgzeeSYbTuJ789ScOKWw4LWYL191
ERLxTlyzbW7nRf8Cg4W0plfc4t7qD8d69uAPwYNtQpv3U6F9kwZQZnVeV+a5FlnUcEgL7J8k
hQZIhcYLQoTZ/irf0ixRnEj+4VqG1c4=
 
/
CREATE OR REPLACE PACKAGE BODY enc_dec wrapped 
a000000
1
abcd
abcd
abcd
abcd
abcd
 
 
The wrap tool has, in fact, encrypted the PL/SQL code contained inside the.sql file, rendering it illegible to anybody else. To create the package, open the create enc dec package.wrp file and double-click it. Keep your.sql source file safe since you will need it later on if you wish to make modifications to the package, which will require you to make changes to the.sql file, wrap it again, and construct the package from scratch.
 
$ sqlplus / as sysdba
 
Connected to:
Oracle Database 10g Enterprise Edition Release 10.2.0.1.0 - Production
With the Partitioning, OLAP and Data Mining options
 
SQL> @create_enc_dec_package.wrp
 
Package created.
 
 
Package body created.
 
SQL> column text format a70
SQL> select text from dba_source where name = 'ENC_DEC';
 
TEXT
----------------------------------------------------------------------
PACKAGE enc_dec wrapped
a000000
1
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
9
a6 b2
ceYtyd1wwstfJ/3xbNlo4sobVxYwg0xHAMusaS/pOPYrUgzeeSYbTuJ789ScOKWw4LWYL1
91
ERLxTlyzbW7nRf8Cg4W0plfc4t7qD8d69uAPwYNtQpv3U6F9kwZQZnVeV+a5FlnUcEgL7J
8k
hQZIhcYLQoTZ/irf0ixRnEj+4VqG1c4=
 
PACKAGE BODY enc_dec wrapped
a000000
1
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
abcd
b
40a 1de
e5uq2Fhk2UgpK5ktxFEVOrE3zyowg5DxLdxqfC9AWE6OGeznw1zpVqLpwIrvVN522Z83WR
wv
HQw142Mg0KQxSHaso6WOT7ud5P5VvVmrcR3le4Pvj9tpyogriMDGGQGWIR5T3g4s5tMka+
Qj
TA4FsoMpOy3+bK/y/VW+u8+zHHC1m0LOziMSmnhkB+nM+U1jEvvRFGGXfOJrOSmXs+VcyV
r8
pyIFRQgr3JDZotwcfIZAw10k4Dcm87LMeBk6c0q2wdqgqcA422/awXKrAODetRti870jST
pn
46w5MWX/ickZHdrfBh6mMttQ8x4jDaNEcZR3X7VRdReUt05S6/LToL4T/VwlYFIqbzH7rb
OR
kaEYBQchlWDg5n3hRBahHVLvEeOuoQVsdBqMwA55PfP1yqqsYWSBW4Mm4OYFJP/ry1NJYb
bA
wVAA/SBw965bdu5doXjpf6y7D5dHh5dtIOL9uUA=
 
SQL>
 

Because the package source code is unreadable by anybody, even the package owner, when it is created from a sql script that has been wrapped, it is recommended that you use this method. We will be able to entirely conceal the encryption logic from everyone in this manner.

Download

 Download script to create Encryprion/Decryprion package

I hope it's helpful for you. If you have any queries, don't hesitate to contact me.

Name : Muhammad Sahal Qasim
E-mail : s.m.sahal789@gmail.com

Thank you.