Restricting to 2 decimals from 3 decimals

Hi,
i declared one variable FKLMG TYPE VBRP-FKLMG in an internal table.im geting 3 decimals for this value(ex:12.123).i want to restict it to two decimals(Ex:12.12).i wrote my code as
itab-fklmg = itab-fklmg+0(12).but im getting error as
Field type "P" does not permit a sub-field access.please help in solving it.
Thanks and Regards
k srinivas

Hi Srinivas,
Try this.
data : var type vBRP-FKLMG.
            CALL FUNCTION 'ROUND'
              EXPORTING
               DECIMALS            = 2
                input               = var
               SIGN                = 'X'
             IMPORTING
               OUTPUT              = var
             EXCEPTIONS
               INPUT_INVALID       = 1
               OVERFLOW            = 2
               TYPE_INVALID        = 3
               OTHERS              = 4
            IF sy-subrc <> 0.
MESSAGE ID SY-MSGID TYPE SY-MSGTY NUMBER SY-MSGNO
         WITH SY-MSGV1 SY-MSGV2 SY-MSGV3 SY-MSGV4.
            ENDIF.
write var.
Note : Above code can be used to round as well as truncate.
If you use SIGN = 'X' (as above)
12.123 --> 12.120
12.125 --> 12.130
12.127 --> 12.130
If you want to truncate third decimal use SIGN = '-'
12.123 --> 12.120
12.125 --> 12.120
12.127 --> 12.120
Simarly there is function for getting higher value is you use SIGN = '+'.
Regards,
Mohaiyuddin

Similar Messages

  • HT201304 It would be tremendously helpful to be able to access, set restrictions, and make changes from the parents device to all devices under the same iTunes account, so that I could make changes to my kids devices without physical access.

    Please help!
    It would be tremendously helpful to be able to access, set restrictions, and make changes from the parents device, to all devices under the same iTunes account, so that I could make changes to my kids devices without physical access.
    I understand that I can set up a different Apple ID for the kids devices, or take physical control of the device and make the changes myself. However, my teenage son is technically savvy enough to have a job in Silicon Valley, as are most young people these days. However, in order to access his devices the current way, I first have to bypass the four digit pass code. This starts a fight of why I need in the device and continues to escalate. The argument that I am the parent will gain access but the fight is simply exhausting, and quite frankly shouldn't have to happen at all. He is not yet an adult, he did not pay for his iPad or iPhone and I, as a parent, should have not only have the right to change options at will, and from anywhere, but look at history or current activity when I feel like it.
    I currently have the settings where app and in-app purchases require my password to be put in, and he must come to me to type it in, but I need more control and would like, and should be able to access any of our six devices and make individual changes simply by logging in to my account, with my password.
    If I can see all my devices on the "Lost My iPhone" app, this technology should be easy to make happen.
    C'mon parents! I have a pretty good kid, given all things that they can get into, but I am not stupid. For everything I see has been done, there is much more I haven't seen. I want my children to be kept safe and be able to know what they are looking at or listening to. We parents are the only ones who know our beliefs and what our kids can handle and when.
    Thanks for any support or information that I may be missing in order to fulfill my request.

    There are mobile device management solutions that can do this, including in Apple's OS X Server system, but most parents generally find that setting this up is more work than it's worth. If you're interested, though, there are a couple that at least purport to be free (I don't know if there are any hidden "gotchas"):
    http://www.unwireddevicelink.com/features/
    https://meraki.cisco.com/products/systems-manager
    and Apple's system:
    http://www.apple.com/osx/server/features/#profile-manager
    I don't think any, however, allow you to see current activity or browser history. iOS doesn't expose those to access from MDM solutions, to the best of my knowledge.
    Regards.

  • Can i restrict apple mail client from downloading all emails...and allow it to pick a start date for gmail mail to sync? i am flooded with old emails, thousands on them ...eating hard drive space of my macbook pro and un necessary overhead

    can i restrict apple mail client from downloading all emails...and allow it to pick a start date for gmail mail to sync? i am flooded with old emails, thousands on them ...eating hard drive space of my macbook pro and un necessary overhead

    The genius bar technicians can check your MBP for possible hardware problems and specific software issues that you may have.  The diagnosis will be free.  Any extensive repairs will not be free.
    If you have minor software problems, you essentially will have to deal with them yourself.  Examine these two comprehensive documents for possible problem definition and solutions.  If you encounter problems that you are unable to cope with, start a new discussion and there will be persons willing to assist you in solving them.
    https://discussions.apple.com/docs/DOC-3521
    https://discussions.apple.com/docs/DOC-3353
    Ciao.

  • How to restrict the user(Schema) from deleting the data from a table

    Hi All,
    I have scenario here.
    I want to know how to restrict a user(Schema) from deleting the values from a table created in the same schema.
    Below is the example.
    I have created a table employee in abc schema which has two values.
    EMPLOYEE
    ABC
    XYZ
    In the above scenario the abc user can only fire select query on the EMPLOYEE table.
    SELECT * FROM EMPLOYEE;
    He should not be able to use any other DML commands on that table.
    If he uses then Insufficient privileges error should be thrown.
    Can anyone please help me out on this.

    Hi,
    kumar0828 wrote:
    Hi Frank,
    Thanks for the reply.
    Can you please elaborate on how to add policies for a table for just firing a select DML statement on table.See the SQL Packages and Types manual first. It has examples. You can also search the web for examples. This is sometimes called "Virtual Private Database" or VPD.
    If you have problems, post a specific question here. Include CREATE TABLE and INSERT statements to create a table as it exists before the policies go into effect, the PL/SQL code to create the policies, and additonal DML statements that will be affected by the policies. Show what the table should contain after each of those DML statements.
    Always say which version of Oracle you're using. Confirm that you have Enterprise Edition.
    See the forum FAQ {message:id=9360002}
    The basic idea behind row-level security is that it generates a string that is automatically added to SELECT and/or DML statement WHERE clauses. For example, if user ABC is only allowed to query a table on Sunday, then you might write a function that returns the string
    USER  != 'ABC'
    OR      TO_CHAR (SYSDATE, 'DY', 'NLS_DATE_LANGUAGE=ENGLISH') = 'SUN'So whenever any user says
    SELECT  *
    FROM    table_x
    ;what actually runs is:
    SELECT  *
    FROM    table_x
    WHERE   USER  != 'ABC'
    OR      TO_CHAR (SYSDATE, 'DY', 'NLS_DATE_LANGUAGE=ENGLISH') = 'SUN'
    ;If you want to prevent any user from deleting rows, then the policy function can return just this string
    0 = 1Then, if somone says
    DELETE  employee
    ;what actually gets run is
    DELETE  employee
    WHERE   0 = 1
    ;No error will be raised, but no rows will be deleted.
    Once again, it would be simpler, more efficient, more robust and easier to maintain if you just created the table in a different schema, and not give DELETE privileges.
    Edited by: Frank Kulash on Nov 2, 2012 10:26 AM
    I just saw the previous response, which makes some additional good points (e.g., a user can always TRUNCATE his own tables). ALso, if user ABC applies a security policy to the table, then user ABC can also remove the policy, so if you really want to prevent user ABC from deleting rows, no matter how hard the user tries, then you need to create the policies in a different schema. If you're creating things in a different schema, then you might as well create the table in a different schema.

  • How to restrict number of hits from a browser, within a specific interval.

    Hi,
    we have a web app in which user clicks on a specific submit continously. This fills up the server threads and other users trying to login either get a timeout or page not found. my questions ---
    1. Is there a way to configure weblogic to timeout the httprequest and also the underlying thead which is doing the work.
    2. Is there a way to restrict number of requests from a client within a specific interval..
    thanks in advance..

    Hello Benita
    Set the dialog type of your search help = 'A' (dialog depends on set of values).
    Regards
      Uwe

  • Restrict transfer of requirments from Sales Order to MRP.

    Hi Friends,
    I have a requirement where in I have to stop/restrict transfer of requirements from Sales order line item to MRP.
    Generally, If the material in Sales order is for Internal production then the Planned order it triggered in MRP and If the material is Externally Procured then a Purchase Req is triggered in MRP. The MRP run is carried out using Transaction code - MD03
    Is there any technical enhancement where I can restrict the transfer of requirements to MRP from Sales order.
    I know I can control it functionally by changing the schedule line category, But We need a technical development to do this as the user would not every time go to Sales order change and then change the schedule line Category.
    Please Advise.
    Thanks & Regards
    Nayan Shah

    Hi Nayan,
    Please try user exits EXIT_SAPLMDR2_001/2/3 if it helps.
    Regards,
    Gaurav

  • Restrict download of documents from a Document library

    Hi,
    I am working on a trial version of SharePoint online E3. I enabled IRM on it with a hope that it will restrict "DOWNLOAD" of documents from a document library itself. However to my bad, it seems it allows downloading... with imposed restrictions. 
    Can anybody help me in this? I need only some of the users to be able to download/print/copy documents from library and NOT all of them. Rest can only view the document. Is it possible in SP Online? 
    Is it possible in SharePoint 2010 or is it the same in here as well?

    Hi 
    yes,sharepoint online we can Use IRM. please refer yes, 
    http://office.microsoft.com/en-in/office365-sharepoint-online-enterprise-help/set-up-information-rights-management-irm-in-sharepoint-admin-center-HA102895193.aspx
    Please remember to click 'Mark as Answer' on the answer if it helps you

  • How do i put a restriction on the imessage from ipod touch?

    How do I put a restriction on the imessage from ipod touch?

    There is no way.  Some users have said that restricting FaceTime also restricts Messages but I just tried that it Messes is still there.

  • How to restrict a schema owner from granting privileges to other users.

    How can we restrict a schema owner from granting privileges to other users on his objects (e.g. tables). Lets say we have user called XYZ and he has tables in his schema TAB1, TAB2 an TAB3. How can we restrict user XYZ from granting privileges on TAB1, TAB2 and TAB3 to other users in the database. Is it possible in Oracle 10g R2? Any indirect or direct way to achieve this? Please help on this.
    Thanks,
    Manohar

    Whenever someone is trying to prevent an object owner from doing something, that's generally a sign of a deeper problem. In a production database, the object owner shouldn't generally have CREATE SESSION privileges, so the user shouldn't be able to log in, which would prevent the user from issuing any grants.
    As a general rule, you cannot stop an object owner from granting privileges on the objects it owns. You can work around this by creating a database-level DDL trigger that throws an exception if the user issuing the statement is XYZ and the DDL is a GRANT. But long term, you probably want to get to the root of the problem.
    Justin
    Edited by: Justin Cave on Nov 6, 2008 9:52 PM
    Enrique beat me to it.

  • Restrict multiple Proforma invoice from order

    Hello All,
    Our customer wants to restrict multiple proforma invoice from sales order.I have written a logic in copy requirement routine.Its working when there is already created invoice from order .But if i try to create invoice first time from order then system doesn't allow me to create invoice and giving message "No billing document were generated ".
    Could anybody help.
    Regards,
    Sachin

    Hi,
    Restrict multiple Proforma invoices
    Thanks & regards.

  • But My client want restriction of BOM change from system.

    Dear Friend,
    My client every now and then BOM is changed. We are changing BOM using Engineering change. But My client want restriction of BOM change from system in plant level/ Material Level. For Example For One month no one should change the BOM.
    Please suggest me how to proceed.
    Regards,
    Sanjay

    Hi Sanjay,
    Another potential solution, to avoid changing authorisation:
    Create a new transaction, based on the standard one. Add some coding to restrict access based on a table (you will need some ABAP coding here).
    You can then develop your own logic.
    For sure you need to give access to the new transaction and remove access from the standard one (check first feasibilty with your authorisation team)
    Thanks and Regards
    Julien

  • Restricting a production order from releasing

    Hi,
    How can i restrict a production order from releasing if material is not available?
    Regards,
    samir
    Edited by: wadajkar on Jun 2, 2010 2:51 PM
    Edited by: wadajkar on Jun 2, 2010 2:51 PM

    Hi,
    In t code OPJK at material avialibility check section maintain '3' i.e. do not release if components are not avialable.
    Regards,
    Vishal

  • Restrict certain Storage location from getting displayed in CO06 !!

    Dear all -
    We have implemented ECC 6 recently & I have a doubt about restricting certain Storage Locations
    in CO06.
    I have 2 storage locations for a plant and would like to restrict it in CO06 one of the storage locations.
    Is there any other way by which I can RESTRICT certain storage locations from getting displayed.
    I am putting in Logistics Execution threat, with an anticipation thall ALL logistics module experts will be able to see this and respond.
    Thanks
    Arun
    Edited by: ARUN TULSI on Jun 25, 2008 10:14 AM

    Dear,
    System determine issue storage location from the material master, the value of the storage location of the BOM item, or the storage location from the supply area.
    Check in BOM component details storage location you have defined.
    Check production storage location from the plant segment of the component is taken into account for the use of MRP areas also. When planned order is being created for the superior assembly in a MRP area?
    Also check the Material requirements planning (PP-MRP)
    --> planning process
      --> BOM explosion and dependent requirements determination
        --> storage location determination for BOM explosion
    Regards,
    R.Brahmankar

  • Restrict some function module from SE37

    Dear all
    i would like to know how to some restrict function module like call_transaction_from_table,authority_check_tcode  bcaz with this our func create mess
    of our system
    and steps how to restrict any function module from se37
    Regards

    dear
    which aurthorization objects
    i checked S_develop,s_programe with DEBUG object in s_develop in prd but people are login through
    function module from DEV to PRD
    call_transaction_from_table
    Regards

  • Restrict sensitive data leakage from Printing, "Save as", Copying and Priting screen?

    Our CEO highly suspected some of our staff who have sold the confidential drawings to competitors but we do not have enough proof. How can we restrict sensitive data leakage from Printing, "Save as", Copying and Priting screen?
    Thank you for your advice in advance.

    calmman8 wrote:
    How can we restrict sensitive data leakage from Printing, "Save as", Copying and Priting screen?
    That all depends on how much hassel you'll willing to go through. You can save an image from Photoshop as a PDF...then inside of Acrobat (can't do it in Photoshop) you have two levels os security. You can require password to even open a PDF and the 2nd level is to require a second password to be able to print, edit or change (once opened there's nothing you can do about screen captures).
    So, you could then control the number of people that had the various password access to open or edit. But...keeping track of those passwords and making sure the people that need them have them can be an issue.
    Note that a secured password protected PDF can have text, images, movies and audio–pretty much anything you might need. Also note there are some issues regarding the password encryption...I don't recall what level of encryption is capable of being exported to forgien countries...you should look into that if disctribution would be outside of the US.

  • Restrict sensitive document leakage from Printing, "Save as", Copying and Priting screen?

    Our President highly suspected some of our staff who have sold the confidential documents to competitors but we do not have enough proof. How can we restrict sensitive data leakage from Printing, "Save as", Copying and Priting screen?
    Thank you for your advice in advance.

    Adobe LiveCycle Rights Management can apply DRM to a PDF file, which prevents printing and content extraction, and links access to the document to a user login - but there is no way to prevent that user saving a copy of the file to disk or a USB drive, or making multiple copies, no from telling someone else their login details. You can revoke access remotely if you suspect a copy has been stolen, but there's no DRM solution for PDF files which can lock the content to a hardware platform, for example in the way a copy of Windows "activates" itself. Opening and copying a file are two entirely-different concepts, and if a LCDRM-encrypted file is published to the Web without the login details to open it, we can be absolutely certain it cannot be cracked as the encryption hashes used by Adobe are so complex they would take billions of years to break, even with government-level resources. Naturally if a user reveals their login details to someone, LiveCycle's audit trail will prove this and you can take legal action against that user, but they may not care if the document has sufficient value.
    Using PDF there is no way to block access to the Print Screen button. Some third-party software converts the PDF into a proprietary file format which only opens in their own software, that in turn attempts to block the print screen keystroke, but it's not hack-proof and the resulting file is of course no longer a PDF. Ultimately if you can see something on screen you can always copy it, either by use of a custom display driver, remote-desktop system or photographing the screen with a cellphone camera, and re-OCRing the pages from those photos.
    Where documents are sufficiently-important to require a guarantee that on-screen reading is the only possible thing a user can do once the file is opened, they should be restricted to using hardware in secured locations, where network access, printers, USB ports etc. can all be removed. This is the approach taken by many enterprise and public-sector agencies; but once a document is distributed to an unregulated location there will always be a way around copy protection on page content if a user can open the file and view it on screen. While there are some interactive page elements in PDF which are harder to "screen scrape" than others (SWF, video and 3D), it can be done. The only elements of a PDF file which can be guaranteed secure even in an unsecure location are invisible features such as scripts when the PDF is protected using LCDRM to ensure it cannot be opened in third-party software.

Maybe you are looking for

  • Range type in ABAP OO.

    Hi, Having problem in ABAP OO. I have defined a working range. (r_vkorg) But what kind of associated type should I use for this in my method. In other words: what type should "vkorg_in" be ? DATA r_vkorg TYPE RANGE OF A004-vkorg. data: wa_vkorg like

  • After install yosemite : one resolution and bad rotation external display

    0- macbook pro 2008 external screen HP L1750 (under a hp factory rotary arm support)  on minidisplay to vga ( this monitor works 60 and 75 htz (natively) 1 - hello, after installing yosemite my external monitor L1750 is only resolution 1280 * 1024. B

  • Change name of a workset?

    I am trying to change the names (not IDs) of some worksets in our ESS/MSS, since we got a product called Siteminder installed and we cannot put any iviews/pages/worksets in edit mode if it has special characters (like ' or < >, etc) in the name. So I

  • Upgrade or not?

    I have the snow leopard program on my mac book pro 10.6.8. Should i upgrade to yosemite or to another package?

  • BAPI_SALESORDER_CHANGE not updating database

    Hi, I am using BAPI_SALESORDER_CHANGE to change the target quantity ( ZMENG ) of the Standard sales order. I am getting no error message in the bapi return table but the data is not getting updated in the database. I am also calling commit work  'BAP