Need security code for my ASHA 305

Hi,
i dint change my phone's security code and when i am trying to reset it its not accepting the default one 12345.Can you please help me in this issue asap.
Solved!
Go to Solution.

Though not sure if this works but a few users on this Forum have posted that after leaving the Battery out for some 30 minutes when they tried again, the phone did not ask for the Security Code..so no harm trying this. 
If this doesn't work you need to get the code reset to 12345 thru' Nokia Care . Need to produce a proof of ownership (Bill / Invoice) to get this done ..

Similar Messages

  • TS1646 I'v tried many times to update my applications however, my account can't do it because security code for my card is incorrect note that I'm sure my card details are correct completely so i need help to fix it as much as you can plz. Thnks

    Hi
    I'v tried many times to update my applications however, my account can't do it because security code for my card is incorrect note that I'm sure my card details are correct completely so i need help to fix it as much as you can plz. Thnks

    Look, I understand I still need a card attached to the account. The problem is, it won't accept my card because I only have 87 cents in my bank account right now.
    If I had known there would be so much trouble with the iTunes card, I would have just put the cash in my bank account in the morning instead of buying an iTunes card (I didn't expect the banks to be open on Thanksgiving of course).
    Apple will only accept cards that have a balance. The balance is so small in my account that it won't accept it as a valid card.
    I'm going to have to contact Apple anyway to reset the security questions. That's obvious. Your answers were not exactly helpful. You didn't tell me anything I don't already know, but thanks for trying to be helpful.

  • My ipod wont let me buy any apps because it says i have an invalid security code for my moms credit card but its the right one. and it also says i owe money for upgrading an app does anyone know how to remove my moms credit card cause i cant figure itout

    my ipod wont let me buy any appps because it says i have an invalid security code for my moms credit card but its the right one. and it also says i owe money for upgrading an app does anyone know how to remove my moms credit card cause i cant figure itout

    To change asccount information see:
    Changing Account Information
    For the code issue this may help.
    iTunes Store: My credit card's security code or zip code does not match my bank's records
    For a standard iTunes account you need a valid payment method even for free apps and app updates.
    What is making it think that you own money for an app upgrade?

  • Do i need security/antivirus for mac macbook pro 15/ 2013

    do i need security/antivirus for my macbook pro 15 2013

    do i need security/antivirus for my macbook pro 15 2013
    If you are using OS X you already have it.
    There will always be threats to your information security associated with using any Internet - connected communications tool:
    You can mitigate those threats by following commonsense practices
    Delegating that responsibility to software is an ineffective defense
    Assuming that any product will protect you from those threats is a hazardous attitude that is likely to result in neglecting point #1 above.
    OS X already includes everything it needs to protect itself from viruses and malware. Keep it that way with software updates from Apple.
    A much better question is "how should I protect my Mac":
    Never install any product that claims to "clean up", "speed up",  "optimize", "boost" or "accelerate" your Mac; to "wash" it, "tune" it, or to make it "shiny". Those claims are absurd.Such products are very aggressively marketed. They are all scams.
    Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources.
    Illegally obtained software is almost certain to contain malware.
    "Questionable sources" include but are not limited to spontaneously appearing web pages or popups, download hosting sites such as C net dot com, Softonic dot com, Soft pedia dot com, Download dot com, Mac Update dot com, or any other site whose revenue is primarily derived from junk product advertisements.
    If you need to install software that isn't available from the Mac App Store, obtain it only from legitimate sources authorized by the software's developer.
    Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
    Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
    Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iCloud, iTunes, or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    Don’t install browser extensions unless you understand their purpose. Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Don’t install Java unless you are certain that you need it:
    Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    Java can be disabled in System Preferences.
    Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
    Beware spontaneous popups: Safari menu > Preferences > Security > check "Block popup windows".
    Popup windows are useful and required for some websites, but unsolicited popups are commonly used to deceive people into installing unwanted software they would never intentionally install.
    Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
    If you ever receive a popup window indicating that your Mac is infected with some ick or that you won some prize, it is 100% fraudulent. Ignore it.
    The same goes for a spontaneously appearing dialog insisting that you upgrade your video player right this instant. Such popups are frequently associated with sites that promise to deliver "free" movies or other copyrighted content that is not normally "free".
    The more insistent it is that you upgrade or install something, the more likely it is to be a scam. Close the window or tab and forget it.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    The most serious threat to your data security is phishing. Most of these attempts are pathetic and are easily recognized, but that hasn't stopped prominent public figures from recently succumbing to this age-old scam.
    OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
    If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

  • How do i set a security code for my credit card

    How do i set a new security code for my credit card?  My daughter is going over her set limit & i need to change the code again. I paid 19.99 last time to get her old i pod setup that is no longer working.  Do i have to pay apple support again or is there some steps i can go through to set a new security code?

    Log into yur account and change/add the necessary information
    iTunes Store: Changing Account Information

  • I forgot my security code for nokia 5800 Xpress Mu...

    Dear all,
               hope you all will be fine doing good, my problem is that i forgot my security code for 5800 XM  is there any way i can restore my security code to default i.e "12345"
    best regards
    Usman Ali
    Solved!
    Go to Solution.

    a factory reset in this case would not work becoz u still need the security code to get the reset done...if u dont know what the security code is then u wont be able to proceed with the reset
    u will have to take the phone to a nokia care point for assistance from a technician - locations are found by clicking the "contact us" link
    if my post helped u out, please click the Star next to it to add some KUDOS to my name

  • IP address conflict help and setting up security code for access

    Hi folks, I am about as non-technical as one can get. So I apologize in advance and thank you guys for your patience as everything you tell me will have to be spelled out for me.
    Ques 1:  I have one desk top computer with internet access through my cable TV provider. On it I have the Linksys WRT54G wireless router.  We use two laptops.
    Lately I've been getting an error message on my desktop saying there is an IP Address that is in conflict. My son often gets booted off line (on laptop) and so I'm guessing maybe it is his laptop that is in conflict. Please help me resolve this issue.
    Quest 2:  I would like to set up a security code for our wireless access so that other people will not be able to intrude upon our signal. Can someone walk me through this as well?
    Thank you so much!
    -Jen in NJ

    The most common reason to get two identical IP addresses, is if you are using fixed LAN IP addresses incorrectly on your system.
    Do you already use any fixed LAN IP addresses? If so, please state what fixed LAN IP addresses you are using, and also state your DHCP server range.
    Rules for using fixed LAN IP addresses on Linksys routers:
    With Linksys routers, a fixed (static) LAN IP addresses must be assigned in the device that is using the address. So you need to enter the fixed address in the computer or printer, not in the router.
    When using a Linksys router, any fixed LAN IP address must be outside the DHCP server range (typically 192.168.1.100 thru 192.168.1.149), and it cannot end in 0, 1, or 255.
    Therefore any fixed LAN IP address would normally need to be in the range of
    192.168.1.2 thru 192.168.1.99 or
    192.168.1.150 thru 192.168.1.254
    assuming you are still using the default DHCP server range.
    Also, in the computer, when you set up a static LAN IP address, you would need to set the "Subnet mask" to 255.255.255.0 and the "Default Gateway" to 192.168.1.1 and "DNS server" to 192.168.1.1
    It is also important that no two devices on your network be set to the same static LAN IP address.
    Check all of your static LAN IP addresses. If you have violated any of the above rules for static LAN IP addresses, it could be the cause for your problem, and you should fix it before attempting any other router repairs or changes.
    *********  Wireless Security  **********
    Brfore proceeding with wireless security, you must get your IP address conflict problem solved.  Please do the above first.
    To set up wireless security, you must use a computer that is wired to the router.
    Where to find the router settings: The router's login password is usually on one of the "Administration" pages. The other settings are all found in the "Wireless" or the "Security" section of the router's setup pages, located at 192.168.1.1
    First, give your router a unique SSID. Don't use "linksys".
    Make sure "SSID Broadcast" is set to "enabled".
    Next, leave the router at its default wireless settings (except for the unique SSID), and then use your pc to connect wirelessly to the router. Test your wireless Internet connection and make sure it is working correctly. You must have a properly working wireless connection before setting up wireless security.
    To implement wireless security, you need to do one step at a time, then verify that you can still connect your wireless computer to the router.
    Next, encrypt your wireless system using the highest level of encryption that all of your wireless devices will support. Common encryption methods are:
    WEP - poor (see note below)
    WPA (sometimes called PSK, or WPA with TKIP) - good
    WPA2 (sometimes called PSK2, or WPA with AES) - best
    WPA and WPA2 sometimes come in versions of "personal" and "enterprise". Most home users should use "personal". Also, if you have a choice between AES and TKIP, and your wireless equipment is capable of both, choose AES. With any encryption method, you will need to supply a key (sometimes called a "password" ).
    The wireless devices (computers, printers, etc.) that you have will need to be set up with the SSID, encryption method, and key that matches what you entered in the router.
    Retest your system and verify that your wireless Internet connection is still working correctly.
    And don't forget to give your router a new login password.
    Picking Passwords (keys): You should never use a dictionary word as a password. If you use a dictionary word as a password, even WPA2 can be cracked in a few minutes. When you pick your login password and encryption key (or password or passphrase) you should use a random combination of capital letters, small letters, and numbers, but no spaces. A login password, should be 12 characters or more. WPA and WPA2 passwords should be at least 24 characters. Note: Your key, password, or passphrase must not have any spaces in it.
    Most home users should have their routers set so that "remote management" of the router is disabled. If you must have this option enabled, then your login password must be increased to a minumum of 24 random characters.
    One additional issue is that Windows XP requires a patch to run WPA2. The patch is located in SP3, so you will need SP3 to run WPA2 in Win XP. Vista already supports WPA2.
    Note:
    WEP is no longer recommended. The FBI has demonstrated that WEP can be cracked in just a few minutes using software tools that are readily available over the Internet. Even a long random character password will not protect you with WEP. You should be using WPA or preferably WPA2 encryption.

  • How to find security code for Airport Extreme

    I need to find the security code for my Airport Extreme to connect to my Smart TV

    Unfortunately, locating the long 64 character code will rarely ever help, since most products will not accept a code of this length.
    Nonetheless.......
    Open Macintosh HD > Applications > Utilities > AirPort Utility
    Click on the AirPort Extreme icon, then click Edit
    Click the Base Station menu at the very top of the screen
    Click Show Passwords

  • Where and how to set a security code for wi-fi connection

    I am running OS 10.8.5 on my MacBook Air and have an Apple Wi-Fi personal connection.  I havn't needed a security code for my network but we are trying to add a wi-fi connection to our Dish Network Whole Home system which consist of two receivers.  In the set-up procedure it asked for a "Security Key" and we don't have one.  I cannot find anything that will work in this step and it will not connect w/o one.  I do not how to do this nor can I find an area for this option.  Can anyone tell me how to do this ?  The Dish Network "connection kit" is set up for wireless.  I have tried the #'s on the modem itself and various others I found in the system preferences under wi-fi.  I am at a complete loss here !!!!!!
    Thank you in advance for your help b/c I KNOW there is someone out there that knows how to do this.  And....it likely is a very easy thing to do - just not me !!

    Contact Dish technical support since it is their product.

  • I am trying to update some apps but my ipad wont let me because it wants me to enter the security code for my credit card and I dont want to do that so how do i fix this?

    I am trying to update some apps but my ipad wont let me because it wants me to enter the security code for my credit card and I dont want to do that how can i fix this?

    Try temporarily disabling your firewall and antivirus.

  • I Need Java code for following Algorithm

    * I Need Java code for following algorithm. Kindly any one help.
    1. Read the contents (ideas and its corresponding scores) from two files named as 'a' and 'b'.
    2. Stored the file 'a' contents in array a[].
    3. Stored the file 'b' contents in array b[].
    4. compare both files like
    if(a.equals(b[j])
    Writing the common idea and add the score from file 'a' and 'b'.
    else
    write the uncommon idea and its score..
    For example :
    Form Agents.txt
    action,65
    architecture,85
    eco-,15
    essay,30
    form,85
    form,85
    link,40
    tangent,25
    Form Agents1.txt
    Black holes,69
    essay,78
    Herewith i have above mentioned two files named as Form Agents and Form Agents1.
    Form Agents has eight fields
    Form Agents1 has two fields
    --> 'essay' is common in two files, so store the idea 'essay' and add the score from Form Agents score is '30' and Form Agents1 has 78 (essay 108).
    Finally it stores idea in another file with uncommon fields also.
    Please help us.

    We have tried with following code.
    But we cant add the scores.
    For Example:
    Form Agents.txt --> has "essay,30"
    Form Agents1.txt --> has "essay,78"
    Result is: essay,108
    Finally it stores idea in another file with uncommon fields also.
    So Any one pls correct the following code.
    try
    DataOutputStream o1=new DataOutputStream(new
    FileOutputStream("C:\\Interfaces\\interfaces\\temp\\BlackBoard\\My Design
    World\\Project\\Material\\art\\System Agents\\Form Agents\\CandidateResponses\\Form
    Agents.txt"));
    //Reading the contents of the files
    BufferedReader br= new BufferedReader(new InputStreamReader(new
    FileInputStream("C:\\Interfaces\\interfaces\\temp\\BlackBoard\\My Design
    World\\Project\\Material\\art\\System Agents\\Form Agents\\Ideological\\Form
    Agents.txt")));
    BufferedReader br1= new BufferedReader(new InputStreamReader(new
    FileInputStream("C:\\Interfaces\\interfaces\\temp\\BlackBoard\\My Design
    World\\Project\\Material\\art\\System Agents\\Form Agents\\Related\\Form
    Agents.txt")));
    while((s=br.readLine())!=null)
    s1+=s+"\n";
    while((s2=br1.readLine())!=null)
    s3+=s2+"\n";
    int numTokens = 0;
    StringTokenizer st = new StringTokenizer(s1);
    String[] a = new String[10000];
    String[] br_n=new String[10000];
    int i=0;
    while (st.hasMoreTokens())
    s2 = st.nextToken();
    a=s2.substring(0,s2.length()-3);
    s6=s2.substring(s2.length()-2);
    br_n[i]=s6;
    i++;
    numTokens++;
    int numTokens1 = 0;
    StringTokenizer st1 = new StringTokenizer (s3);
    String[] b = new String[10000];
    String[] br1_n=new String[1000];
    int j=0;
    while (st1.hasMoreTokens())
    s4 = st1.nextToken();
    b[j]=s4.substring(0,s4.length()-3);
    s7=s4.substring(s4.length()-2);
    br1_n[j]=s7;
    j++;
    numTokens1++;
    int x=0;
    for(int m=0;m<a.length;m++)
    for(int n=0;n<b.length;n++)
    if(a[m].equalsIgnoreCase(b[n])){
    int sc=Integer.parseInt(br_n[m]);
         int sc1=Integer.parseInt(br1_n[n]);
    int score=sc+sc1;
         o.writeBytes(a[m]+","+score+"\n");
    break;
    else
    o.writeBytes(a[m]+","+br_n[m]+"\n");
    break;
    }catch(Exception e){}

  • I need php code for copy paste our all histroy of browser in a text page.

    I need php code for copy paste our all histroy of browser in a text page can any one send me the code please.

    You can use an application like GarageSale for doing this....
    http://www.macupdate.com/info.php/id/16035/garagesale

  • Need a code for Customer exit for extractor 0WBS_ELEMT_ATTR

    Hi Guys,
    I need a code for following requirement.
    I have appended some fields to standard extractor 0WBS_ELEMT_ATTR which normally takes data from PRPS table. But the new fields will be getting data from PRTE and PROJ table. with common keys. Following is my code which is not working. Please help me out, I am not good in abap. Please note some lines are commented.
    Thanks,
    H
    CODE:::::
    form 0wbs_elemt_attr  tables i_t_data structure biw_prps.
      data: it_wbs_prps like biw_prps occurs 0.
      data wa_prps like it_wbs_prps.
    data: begin of it_wbs_prps occurs 0,
             PSPNR like prps-pspnr,
             POSID like prps-posid,
             PBUKR like prps-PBUKR,
             IZWEK like prps-IZWEK,
             USR10 like prps-USR10,
             USR00 like prps-USR00,
             USR02 like prps-USR02,
             OBJNR like prps-OBJNR,
           end of it_wbs_prps.
    data wa_prps like it_wbs_prps.
      data: begin of it_wbs_prps1 occurs 0,
              PSPNR like prps-pspnr,
              POSID like prps-posid,
            end of it_wbs_prps1.
      data wa_prps1 like it_wbs_prps1.
      data: begin of it_wbs_prte occurs 0,
              posnr like prte-posnr,
              PSTRT like prte-PSTRT,
              PENDE like prte-PENDE,
              ESTRT like prte-ESTRT,
              EENDE like prte-EENDE,
              ISTRT like prte-ISTRT,
              IENDE like prte-IENDE,
            end of it_wbs_prte.
      data wa_prte like it_wbs_prte.
      data: begin of it_wbs_proj occurs 0,
              PSPNR like proj-pspnr,
              PLFAZ like proj-plfaz,
              PLSEZ like proj-plsez,
            end of it_wbs_proj.
      data wa_proj like it_wbs_proj.
    refresh: it_wbs_prte, it_wbs_proj.
    *it_wbs_jest.
    if i_t_data[] is not initial.
    Get data from PRPS WBS Master Data
         select pspnr posid PBUKR IZWEK USR10 USR00 USR02 objnr
           into corresponding fields of table it_wbs_prps
           from prps
            for all entries in i_t_data
          where POSID = i_t_data-POSID.
         sort it_wbs_prps by posid.
    Get data from PRPS1 WBS Master Data
          select pspnr posid
           into corresponding fields of table it_wbs_prps1
            from prps
            for all entries in i_t_data
         where POSID = i_t_data-POSID.
        sort it_wbs_prps1 by posid.
    Get data from PRTE Scheduling Data for Project Item
         if it_wbs_prps1[] is not initial.
         select posnr PSTRT PENDE ESTRT EENDE ISTRT IENDE
           into corresponding fields of table it_wbs_prte
           from prte
            for all entries in it_wbs_prps1
          where posnr = it_wbs_prps1-pspnr.
         sort it_wbs_prte by posnr.
         endif.
    Get data from PROJ Project Master Data
         if it_wbs_prps1[] is not initial.
         select pspnr PLFAZ PLSEZ
           into corresponding fields of table it_wbs_proj
           from proj
           for all entries in it_wbs_prps
          where pspnr = it_wbs_proj-pspnr.
         sort it_wbs_proj by pspnr.
         endif.
    loop at i_t_data.
       clear: wa_prps1, wa_prte, wa_proj.
       read table it_wbs_prps into wa_prps with key
                  posid = i_t_data-posid binary search.
       read table it_wbs_prte into wa_prte with key
                  posnr = wa_prps1-pspnr.
       read table it_wbs_proj into wa_proj with key
                  pspnr = it_wbs_proj-pspnr.
             i_t_data-zzPBUKR = wa_prps-pbukr.
             i_t_data-zzIZWEK = wa_prps-IZWEK.
             i_t_data-zzUSR10 = wa_prps-USR10.
             i_t_data-zzUSR00 = wa_prps-USR00.
             i_t_data-zzUSR02 = wa_prps-USR02.
              i_t_data-zzPSTRT = wa_prte-PSTRT.
              i_t_data-zzPENDE = wa_prte-PENDE.
              i_t_data-zzESTRT = wa_prte-ESTRT.
              i_t_data-zzEENDE = wa_prte-EENDE.
              i_t_data-zzISTRT = wa_prte-ISTRT.
              i_t_data-zzIENDE = wa_prte-IENDE.
              i_t_data-zzPLFAZ = wa_proj-PLFAZ.
              i_t_data-zzPLSEZ = wa_proj-PLSEZ.
        modify i_t_data.
    endloop.
    endif.
    endform.                    " 0wbs_elemt_attr

    Hi,
    it_wbs_prps1 .
    If you are going to use this internal table to check for a null condition, shouldn't you first assign the data package to it?
    For example,   it_wbs_prps1 = i_t_data[].
    Because you are now using  it_wbs_prps1 to select data from a table and it doesn't have any data.
    Please check.
    -RMP
    Edit : Please ignore this. I didn't see that you are actually filling the internal table. Sorry!
    Edited by: RMP on Oct 18, 2010 12:16 PM

  • Need a code for finding prime no.s from 0 to 100.

    Hi,
    i need a code for finding prime no.s from 0 to 100.
    Please help me out.
    Regards,
    Santosh Kotra.

    hai santosh,
    here is an example program to find the prime number...........
    EXAMPLE:
    DATA: BEGIN OF primes OCCURS 0,
            number TYPE i,
            exp    TYPE i,
          END OF primes.
    DATA: w_mult TYPE i,
          w_limi TYPE i,
          w_prem TYPE i.
    DATA: w_outp TYPE text132.
    DATA: w_rtime TYPE i,
          w_stime TYPE p DECIMALS 3.
    DEFINE add_part.
      sy-fdpos = strlen( &1 ) + 1.
      &1+sy-fdpos(*) = &2.
      condense &1.
    END-OF-DEFINITION.
    PARAMETERS: p_numb TYPE i,                "number to check
                p_fact TYPE c AS CHECKBOX,    "display components
                p_nbpr TYPE c AS CHECKBOX.    "nb of primes
    START-OF-SELECTION.
      GET RUN TIME FIELD w_rtime.
      IF p_nbpr IS INITIAL OR p_numb LE 12000.
        PERFORM eratostene USING p_numb.
        add_part w_outp p_numb.
        READ TABLE primes WITH KEY number = p_numb.
        IF sy-subrc = 0.
          add_part w_outp 'is prime'.
        ELSE.
          IF p_fact IS INITIAL.
            add_part w_outp 'is not prime'.
          ELSE.
            add_part w_outp '='.
            w_limi = p_numb.
            LOOP AT primes WHERE exp GT 0.
              CHECK primes-number LE w_limi.
              IF w_prem GT 0.
                add_part w_outp '*'.
              ENDIF.
              IF primes-exp GT 1.
                add_part w_outp '('.
                add_part w_outp primes-number.
                add_part w_outp '^'.
                add_part w_outp primes-exp.
                add_part w_outp ')'.
              ELSE.
                add_part w_outp primes-number.
              ENDIF.
              w_limi = w_limi / ( primes-number ** primes-exp ).
              IF w_limi = 1.
                EXIT.
              ENDIF.
              w_prem = 1.
            ENDLOOP.
          ENDIF.
        ENDIF.
        WRITE: / w_outp.
        IF NOT p_nbpr IS INITIAL.
          DESCRIBE TABLE primes LINES sy-tmaxl.
          CLEAR: w_outp.
          add_part w_outp 'Number of primes:'.
          add_part w_outp sy-tmaxl.
          WRITE: / w_outp.
          SKIP.
          LOOP AT primes.
            WRITE: / primes-number.
          ENDLOOP.
        ENDIF.
      ELSE.
        PERFORM factors.
      ENDIF.
      GET RUN TIME FIELD w_rtime.
      w_stime = w_rtime / 1000000.
      SKIP.
      CLEAR: w_outp.
      add_part w_outp 'Calculation time:'.
      add_part w_outp w_stime.
      WRITE: / w_outp.
          FORM eratostene                                               *
    FORM eratostene USING in_number TYPE i.
      DATA: BEGIN OF no_primes OCCURS 0,
              number TYPE i,
            END OF no_primes.
      DATA: cnum TYPE i,
            dnum TYPE i,
            limi TYPE i,
            mult TYPE i,
            puis TYPE i,
            cmod TYPE i.
      IF NOT ( p_fact IS INITIAL AND p_nbpr IS INITIAL ).
        limi = in_number.
      ELSE.
        limi = sqrt( in_number ).
      ENDIF.
      cnum = 2.
      WHILE cnum LE limi.
        READ TABLE no_primes WITH KEY number = cnum.
        IF sy-subrc NE 0.
          primes-number = cnum.
          mult = 2.
          puis = 1.
          dnum = mult * cnum.
          WHILE dnum LE in_number.
            READ TABLE no_primes WITH KEY number = dnum.
            IF sy-subrc NE 0.
              no_primes-number = dnum.
              APPEND no_primes.
            ENDIF.
            IF NOT p_fact IS INITIAL.
              cmod = dnum MOD ( cnum ** puis ).
              IF cmod = 0.
                cmod = in_number MOD ( cnum ** puis ).
                IF cmod = 0.
                  primes-exp = puis.
                  puis = puis + 1.
                ENDIF.
              ENDIF.
            ENDIF.
            mult = mult + 1.
            dnum = mult * cnum.
          ENDWHILE.
          APPEND primes.
          CLEAR: primes.
        ENDIF.
        cnum = cnum + 1.
      ENDWHILE.
    ENDFORM.
          FORM factors                                                  *
    FORM factors.
      DATA: ex_factors TYPE string,
            mod        TYPE i,
            still      TYPE f,
            factor     TYPE i,
            exponent   TYPE i,
            square     TYPE f,
            fac_string TYPE text40,
            exp_string TYPE text40.
      IF p_numb LE 3.
        ex_factors = p_numb.
      ELSE.
        factor = 2.
        still  = p_numb.
        DO.
          CLEAR: exponent.
          mod = still MOD factor.
          WHILE mod = 0.
            exponent = exponent + 1.
            still    = still div factor.
            mod      = still MOD factor.
          ENDWHILE.
          IF exponent EQ 1.
            fac_string = factor.
            CONCATENATE ex_factors '*'  fac_string
                                   INTO ex_factors
                           SEPARATED BY space.
            CONDENSE ex_factors.
          ELSEIF exponent GT 1.
            fac_string = factor.
            exp_string = exponent.
            CONCATENATE ex_factors '* (' fac_string
                                   '^'   exp_string ')'
                                   INTO  ex_factors
                           SEPARATED BY space.
            CONDENSE ex_factors.
          ENDIF.
          factor = factor + 1.
          square = factor ** 2.
          IF square GT still.
            EXIT.
          ENDIF.
        ENDDO.
        IF still GT 1.
          CATCH SYSTEM-EXCEPTIONS convt_overflow = 1.
            fac_string = factor = still.
          ENDCATCH.
          IF sy-subrc NE 0.
            fac_string = still.
          ENDIF.
          CONCATENATE ex_factors '*' fac_string
                                INTO ex_factors
                        SEPARATED BY space.
          CONDENSE ex_factors.
        ENDIF.
        SHIFT ex_factors UP TO '*'.
        SHIFT ex_factors BY 2 PLACES.
      ENDIF.
      WRITE: / p_numb RIGHT-JUSTIFIED.
      IF ex_factors CA '*^'.
        WRITE: '=', ex_factors.
      ELSE.
        WRITE: 'is prime'.
      ENDIF.
    ENDFORM.
    HOPE THIS WILL BE HELPFULL.
    regards
    praba.

  • I need ready code for a simple paint program today

    hi all I need ready code for a simple paint program today for me ics projct
    plz give me a halp on this give me what you have with you and it is so good if it look like this :
    Design a GUI based drawing Java application that works like a simple paint program
    1-There should be a number of buttons for choosing different shapes to draw. For example, there should be a button for rectangle. If user presses the rectangle button, then he can draw a rectangle using mouse. Similarly, there should be a button for each shape(rectangle, circle, ellipse, and line etc.
    2-The shapes can be filled with different colors.
    3-There should be option of moving .
    4- There should also be three menus including File, Shape, and Color menu.
    i. File menu can have menu items New and Exit. If user selects New, the drawing area will be cleared and all shapes will be erased.
    ii. Shape menu will serve the same purpose as of feature 2 described above. It will have menu items for drawing all the different shapes. For example, there will be menu item for rectangle; so user can draw a rectangle by selecting the menu item for rectangle.
    iii. Color menu will serve the same purpose as of feature 3 described above. It will have menu items for all the colors which are shown in color buttons. The user can select a color from this menu and then click inside a shape to fill it with the selected color.

    Read the Swing tutorial. There are sections on how to use menus and painting and all other kinds of stuff you need to do this homework assignment. Nobody here is going to write the code for you:
    http://java.sun.com/docs/books/tutorial/uiswing/TOC.html

Maybe you are looking for