Maintain Print Programs and Forms in Transaction QM02

Ali
Ali
Updated on 30-Jul-2019 22:30:20

156 Views

You have the print program configured in IMG. Run T-code: SPRONext is to assign Shop Papers to “Notification Type” this is used to tell which Shop Paper 4-CHAR code you care about, define Shop Papers has the ABAP Form and Print Program.

Write Method Names in Java

varma
Updated on 30-Jul-2019 22:30:20

3K+ Views

While writing a method name we should follow the camel case i.e. first letter of the first word should be small and the first letters of the remaining (later) words should be capital. Example public class Test { public void sampleMethod() { System.out.println("This is sample method"); } public void demoMethod() { System.out.println("This is demo method"); } public static void main(String args[]) { Test obj = new Test(); obj.sample(); obj.demo(); } } Output This is sample method This is demo method

Storing Personal Information in LDAP, AD, or SAP HR Module

Daniol Thomas
Updated on 30-Jul-2019 22:30:20

169 Views

LDAP can store sensitive information but it is not recommended to store sensitive information in LDAP from a security point of view. This information should go to some HR information or you can also develop a middleware to store this information. You can use EMP ID to track this information back to middleware or LDAP.

Difference Between Method Hiding and Method Overriding in Java

Sreemaha
Updated on 30-Jul-2019 22:30:20

2K+ Views

When super class and the sub class contains same instance methods including parameters, when called, the super class method is overridden by the method of the sub class. WIn this example super class and sub class have methods with same signature (method name and parameters) and when we try to invoke this method from the sub class the sub class method overrides the method in super class and gets executed. Example Live Demo class Super{ public void sample(){ System.out.println("Method of the Super class"); } } public ... Read More

Method Hiding in Java: Definition and Usage

Giri Raju
Updated on 30-Jul-2019 22:30:20

2K+ Views

When super class and sub class contains same method including parameters and if they are static. The method in the super class will be hidden by the one that is in the sub class. This mechanism is known as method hiding. Example Live Demo class Demo{ public static void demoMethod() { System.out.println("method of super class"); } } public class Sample extends Demo { public static void demoMethod() { System.out.println("method of sub class"); } public static void main(String args[] ) { Sample.demoMethod(); } } Output method of sub class

RFC_ABAP_Exception Error While Querying Columns Using RFC_READ_TABLE in SAP

Vikyath Ram
Updated on 30-Jul-2019 22:30:20

330 Views

It is not because of a number of columns but the actual total size of the fields you are querying. It should not be more than 512 bytes.  For RFC communication, the types likes DATA or STANDARD table are not supported. So the RFC_READ_TABLE function module has to convert the data into the generic format and the data is transferred as a series of lines. It is the size of these table lines that matter. The size cannot exceed 512 characters.  If the size is greater than 512 characters, the module throws a Rfcabapexception exception with a short dump.  The ... Read More

Check User Authorization for T-Code in SAP System

Samual Sam
Updated on 30-Jul-2019 22:30:20

10K+ Views

To check if a user has authorization for T-code or not you can use Transaction SUIM. You can manage user permissions using different ways like profile assignment via a single role, collective roles that contain single roles, etc. Below shows SUIM transaction that opens User Information System as below:You can also join tables: AGR_USERS and AGR_1251AGR_USERS is a standard SAP Table which is used to store Assignment of roles to user information. This is available within R/3 SAP systems depending on the version and release level.AGR_1251 is a standard SAP Table which is used to store Authorization data for the activity ... Read More

Write Variable Names in Java

Sreemaha
Updated on 30-Jul-2019 22:30:20

4K+ Views

While choosing an identifier to declare a variable in Java you need to keep the following points in mind. The name of the variable should begin with either alphabet or, an underscore (_) or, a dollar ($) sign. The identifiers used for variables must not be keywords. No spaces or special characters are allowed in the variable names of Java. Variable names may contain 0 to 9 numbers (if not at the beginning). Variable names are case sensitive i.e. MY_NUM is different from my_num. If you use two words in a identifier then the you should follow camel case ... Read More

References Not Allowed in SAP Remote Function Call

Giri Raju
Updated on 30-Jul-2019 22:30:20

391 Views

You are trying to make use of references but you should be aware that it is accessible only with the same stack and in your case, it is not. You are creating a remote function module and here references will not work. So, you should be going with parameters as ‘pass by value’ instead of ‘pass by reference’.

Check List of Existing Authority Objects in SAP System

Monica Mona
Updated on 30-Jul-2019 22:30:20

544 Views

To maintain authorization objects, you can use T-code: SU21 in SAP ECC system.You can all authorization objects including S_CARRID is located inside the different class like - BC_C object class.

Advertisements