Screen shots (Complete) - SAP AD HOC Query Tutorial (S_PH0_48000513)


Source guru99.com

SAP AD HOC Query Tutorial (S_PH0_48000513)


The Ad Hoc Query is a tool for building reports and queries on basic data of an employee.It offers access to data of all SAP infotypes. This tool can process data linked to: o Time management o Organizational management o Compensation management o Training etc.
Step 1) In the SAP Command prompt , Enter transaction S_PH0_48000513
SAP AD HOC Query Tutorial (S_PH0_48000513)
Step 2) In the next SAP screen,
  1. Select a Work Area - queries linked to a specific client or to all clients
  2. Choose a User Group - to access available infosets
  3. Choose an Infoset - In the  list select the desired infoset
  4. Click the Check Mark Button
SAP AD HOC Query Tutorial (S_PH0_48000513)
Step 3) The SAP Ad-hoc query working panel is shown-
SAP AD HOC Query Tutorial (S_PH0_48000513)
Overview of the various sections
  1. Field group/field=Where you define the selections and output fields
  2. Reporting Period =This is where you define the period for which the selected objects are to be retrieved.
  3. Selections = Once you have ticked a field in the "Selection" column in the "Field Group/Fields" section, it will appear in the "Selections" section where you can restrict the employees selected
  4. Testing the selections = to update the number of "hits" obtained by the query
  5. Functions=Some layout functionalities are accessible simply by using your mouse or via buttons located in the "Preview of Output"
  6. Main functions = create a new query, open existing query, execute a query

Executing a Query:Choosing Output

  1. The section field / group fields shows list of all available infotypes
  2. Select the Infotye whose data you want in output
  3. Select the Infotype field by checking "output"
  4. Data is displayed at the bottom of the working panel
SAP AD HOC Query Tutorial (S_PH0_48000513)

Choosing Input

It is possible to restrict or limit the population selected, by using any element. Once you have ticked a field in the "Selection" column in the "Field Group/Fields" section, it will appear in the "Selections" section from where you can set the restrictions.
SAP AD HOC Query Tutorial (S_PH0_48000513)
  1. For Example , check the Selection Column for Year of Birth
  2. It appears in the Selection Section
  3. You may choose to restrict values via a pattern , single value , etc
  4. Enter the restriction value
In case of multiple selections , the link between the selections is automatically AND
SAP AD HOC Query Tutorial (S_PH0_48000513)
Above example will produce a list of women (Gender Key = 2) AND born in 1976

Results

Click on output.
SAP AD HOC Query Tutorial (S_PH0_48000513)
Results are displayed
SAP AD HOC Query Tutorial (S_PH0_48000513)
Note: Make sure you select correct Reporting Period for your Query

3 comments:

  1. wow ! nice post Indian Cyber Army gives the best in the Cyber crime investigation. We have put our foot one-step forward launching an effective Summer Internship program.The Summer Internship 2018 registrations are open for 2nd batch starting from 2 july 2018. Our standard services of Cyber Crime Investigation are class apart owing to years of proficiency. We provide Advanced Cyber Security, Ethical Hacking, Digital Forensics, etc. trainings to keep India totally secure from the Cyber Offenders.

    ReplyDelete
  2. I simply wanted to write down a quick word to say thanks to you for those wonderful tips and hints you are showing on this site. The Information security community consists of experts from a diverse range of disciplines, experiences, and training. Indian Cyber Army has been dedicated in fighting cyber crime, striving to maintain law and order in cyberspace so as to ensure that everyone remains digitally safe. Join with to create awareness, handle the project and make the career in this field.

    ReplyDelete
  3. Indian Cyber Army validity in Ethical hacking training and Cybercrime investigation preparing learning and full help with essential and additionally propelled level moral hacking and cyber crime examination courses.

    ReplyDelete