What is the use for lock object and how to use the lock objects

Hi Guru's,
I am new to ABAP .Can you please clarify the that what is the use of lock object and how to use the loct object .what is use of the Deque & Enque  function modules .

hi ,
below are some minfo about lock objects :
  Lock Objects
These types of objects are used for locking the access to database records in table. This mechanism is used to enforce data integrity that is two users cannot update the same data at the same time. With lock objects you can lock table-field or whole table.
In a system where many users can access the same data, it becomes necessary to control the access to the data. In R/3 system this access control is built-in on database tables. Developers can also lock objects over table records.
To lock an object you need to call standard functions, which are automatically generated while defining the lock object in ABAP/4 dictionary. This locking system is independent of the locking mechanism used by the R/3 system. This mechanism also defines LUW i.e. Logical Unit of Work. Whenever an object is locked, either by in built locking mechanism or by function modules, it creates corresponding entry in global system table i.e. table is locked. The system automatically releases the lock at the end of transaction. The LUW starts when a lock entry is created in the system table and ends when the lock is released.
Creating Lock Objects
Lock object is an aggregated dictionary object and can be defined by using the following steps:
o From initial data dictionary screen, enter the name for the object, Click Lock object radiobutton and then click on Create. The system displays a dialog box for Maintain Lock Objects screen
o Enter short text as usual and the name for primary table.
-Save
-Select Tables option
From this screen you can:
Select secondary tables, if any, linked by foreign key relationship.
Fields for the lock objects. This option allows you to select fields for objects (R/3 system allows locking up to record level). Lock object argument are not selected by user but are imposed by the system and includes all the primary keys for the table.
1) Exclusive lock: The locked data can only be displayed or edited by a single user. A request for another exclusive lock or for a shared lock is rejected.
2) Shared lock: More than one user can access the locked data at the same time in display mode. A request for another shared lock is accepted, even if it comes from another user. An exclusive lock is rejected.
3) Exclusive but not cumulative: Exclusive locks can be requested several times from the same transaction and are processed successively. In contrast, exclusive but not cumulative locks can be called only once from the same transaction. All other lock requests are rejected.
Also, last but not the least, locking the object is logical (locking with any enqueue ) .so, you have to use the lock object while trying to access from second program .
reward if helpful ,
Regards,
Ranjita

Similar Messages

  • Have photoshop cs6 for windows and am now migrating to a mac with Yosemite installed.  Where can I download the cs6 for mac? And can I use the same serial no that  I received for windows.

    Have photoshop cs6 for windows and am now migrating to a mac with Yosemite installed. 
    Where can I download the cs6 for mac? And can I use the same serial no that  I received for windows.

    You need to run a platform swap:
    Order product | Platform, language swap
    Until it's through, you can use the trial version.
    Download CS6 products
    Mylenium

  • What is error 5100 for multifunction printeers and how do you fix it?

    what is error 5100 for multifunction printeers and how do you fix it?

    I have a canon MG3200 printer. I have had this thing a whole TWO DAYS! i had issue after issue setting it up and then finally getting it to print the other day when I got it home. A simple 5 minute print job on any of the other printers I used to have, and it took almost 35 minutes to produce an almost decent quality for some important paperwork that I had to have in the following morning. Aside from that- (I just took that to mean it was the "learning" curve) I now tried to print a simple, one page document. Postage for a package to go out tomorrow morning via USPS. Lo and behold, it had a paper jam immediately. A bad one. Had to spend more than an hour searching around for ways to even get the covers off in order to pull the paper free. Got it cleared out, now the P-2-0, or 5100 error message is just blinking away. I've taking it back apart in the back 3 times now, taken the ink cartridges out and looked for paper jammed, not found anything, and now the blinking error won't go away. Can someone PLEASE tell me how to clear that error message??? I am about ready to return this printer to walmart, and get a different one. If it wn't work, then it does me no good. Thank you in advance for being able to virtually rant and rave about this. mediatrek wrote:
    Usually an error 5100 code is saying that the ink carriage has problems. Usually something currently is or recently hammed the cartridge carriage. With the machine turned off and the power cord unplugged, open the machine and inspect the inside do you see any stray pieces of paper along the paper's usually route?
    There is a way to reset the machine to clear out the error. I would need to know the exact model of your Canon. 

  • How to create documentation for report programs and how to use it

    how to create documentation for report programs and how to use it in the selection screen by placing an icon in the Applicatin Tool bar. If i click this icon the help documentation has to display.
      Note: Exaple <b>RSTXSCRP</b> programs selection screen

    Hi
    1 goto SE38 transaction, give the program name
    2 Click on documentation radiobutton & then press change
    3 Write your PURPOSE, PREREQUISITES etc details
    4 Save the same & Activae it.
    The icon will come automatically on selection screen
    Thanks
    Sandeep
    Reward if useful

  • What are variables or parameters in Apex and how to use them?

    Hi
    What are variables or parameters in apex and how to use them to connect and run BI Publisher Report
    From Apex URL

    Hello Kanaiya,
    You should go here: http://www.oracle.com/technology/products/database/application_express/index.html
    Look at "What is Oracle APEX?" then download the documentation and review the various PDF files that are available.
    If you have a version of APEX installed and available, go through the 2-Day Application Express Developer's Guide followed by the Advanced Developer's Guide.
    Good luck,
    Don.

  • What is the use vss in java and how to use it?

    can i know what is vss in java and how to use it and also can you tell me related vss like svs?
    and what are tools for configuration in real we will use?
    am i student i want to know these all?

    jduprez wrote:
    You do not need to know them all, but one for sure, since it is a must for multi-developer team.8o( ?????
    It is a must. Period.
    OK, let's tone down: it is a must for any job related to software production. Not only development.That begsl the question, What does it mean to "know" one of these systems? I would expect Product Management, Documentation, QA, and Support staff to be conversant with the fundamentals of such a tool--check in, check out, version/revision numbers--but not much more than that. Developers, on the other hand, I would generally expect "know" the system with a much higher level of expertise--query language, branching, merging, and so on.

  • What is the use of ST05 ? and how to use  " ST05 "

    can anybody tell me what is the use of  " ST05 "
    and how can we handle it.

    SQL Trace
    SQL trace(ST05) provides the developer with the ability to analyse database select statements. Simply execute ST05
    to turn on SQL trace, then execute the statement/program you want to analyse. Now turn off SQL trace using ST05
    and click on list trace to view the details.
    You can also perform traces on other items such as authorisation objects.
    Authorisation trace analysis 1. Open two sessions
    2. Execute transaction ST01 in one of the sessions
    3. Select the authorisation checkbox, note the other traces
    you can perform (SQL, RFC, Table Buffer etc)
    4. Click the 'Trace On' button
    5. Within your other session execte the transaction/report
    you want to trace or get the user in question to do it
    6. Return to the session where you turned the trace on and
    click on 'Trace Off' otherwise it will continue to record
    all athorisation checks
    7. Click on the 'Analysis' button
    8. Enter appropriate data into selection screen such as
    Username, type of trace records (i.e. Authorization check)
    9. Click on the Execute button.
    10. Report displaying trace results will now be displayed
    http://www.sapdevelopment.co.uk/perform/perform_sqltrace.htm
    Some useful transaction related to this are ..
    ST01 SAP system trace
    ST02 Buffer statistics.
    ST03 Workload analysis.
    ST04 Database performance analysis.
    ST05 SQL trace .
    ST06 Operating system monitor ...
    From the recorded SQL trace you can deduce:
    · Which SQL statements your application carries out
    · Which values the system uses for specific database accesses and changes
    · How the system translates ABAP OPEN SQL commands (such as
    SELECT) into standard SQL commands
    · Where your application positions COMMIT statements
    · Where your application makes repeated database accesses
    · What database accesses or changes occur in the update section of your
    application
    Look at the below links, you will get the idea
    http://help.sap.com/saphelp_erp2005/helpdata/en/d1/801f89454211d189710000e8322d00/content.htm
    http://www.sapbrain.com/TOOLS/SQLTRACE/SQL_TRACE.html
    Check the following links:
    http://www.sapbrainsonline.com/TOOLS/RUNTIMEanalysis/SAP_runtime_analysis.html
    http://www.sapbrainsonline.com/TOOLS/SQLTRACE/SQL_TRACE.html
    Use
    The Performance Trace allows you to record database access, locking activities, and remote calls of reports and transactions in a trace file and to display the performance log as a list. It also provides extensive support for analyzing individual trace records.
    SQL Trace: This allows you to monitor the database access of reports and transactions.
    Enqueue Trace: This allows you to monitor the locking system.
    RFC Trace: This provides information about Remote Function Calls between instances.
    While the trace is switched on, the SQL Trace function records all database activity by a particular user or group of users. The R/3 System takes OPEN SQL statements and converts them in to embedded SQL statements that it passes to the database. It is the embedded SQL statements, their parameters, return codes, and the number of entries retrieved, inserted, or deleted that are recorded in the SQL Trace file. The log file also contains the runtime of the statement and the place in the application program from which it was called.
    The SQL trace tells you:
    The SQL statements executed by your program.
    The values that the system uses for particular database access and changes.
    How the system converts ABAP Open SQL statements (such as SELECT) into Standard SQL statements.
    Where your application executes COMMITs.
    Where your application repeats the same database access.
    The database accesses and changes that occur in the update part of your application.
    Refer
    http://help.sap.com/saphelp_erp2005vp/helpdata/en/43/cb632772cd0cd4e10000000a1553f7/frameset.htm
    Regards
    Vasu

  • What type of encryption is firefox using for password protection and how trustworthy is it

    I would like to know what kind of encryption FF uses and how I know I can trust it? This is not a bone of contention with FF, I love the product, rather it is just a concern I have that will convince me to let FF manage my financial passwords. Thanks for any assistance with understanding this issue more completely.

    The degree of protection very much depends on how strong your master password is.
    When using a master password, the data is encrypted using [http://www.tropsoft.com/strongenc/des3.html Triple DES Encryption in CBC mode]. This level of encryption is good for general purpose use. The weak point it the master password, if you have a weak master password there are programs available that will be able to crack the master password, they often do this by using a brute force method. If you use a strong master password, the brute force method will need a very long time to crack passwords. For details on password strength and creating strong passwords see http://en.wikipedia.org/wiki/Password_strength and http://luxsci.com/blog/security-simplified-the-basesuffix-method-for-memorable-strong-passwords.html

  • When I am using the browser for a while and try to use ANY search bar and hit the "search" button it does a whopping NOTHING is there anyway of keeping this from happening?

    Whenever I am using Firefox mobile - either regular, beta or aurora and go to search for something like through the Google search page and attempt to search for something the search bar does nothing and hitting the enter button instead doesn't do anything either. Is there a way to keep this from happening?

    Hi and thanks to not leaving the firefox user alone.
    Cor-el your answer is right as the madperson is and I already knew all these
    answer and I said that before I don’t use any antivirus and I always turn off my firewall from the moment I installed my Windows.
    I even turn off any automatic update for any of my software and I never let any unknown plugins or any thing like that be install without informing me. And if you know some things like Offline Storage and cookies must be to much more than usual and you have to clear them and delete them and I know so much more
    And if you want to know it fixed now. But I don’t know how?
    For understanding my problem read and research about Ixplorer.exe virus it is the same problem about the speed but the different is it doesn’t show any process in task manager like Ixplorer.exe virus
    Bt I have done some things but still I don’t know that’s why it is fixed or not
    First: I searched my system and removed any files have been crated on my system from two days ago since the problem happened.
    And then I used to go about the article in this page and did like this:
    http://answers.yahoo.com/question/index?qid=20080910101846AAazxN5
    but still I don’t know any thing about the problem.
    I can do so many things to fix but I am just curios if that is a virus why it just cut the speed when I am using the browser.
    Please if any one found the reason send me your information I like to know it will improve my knowledge however my problem is solved fro now.

  • How to ask for an array and how to save the values

    I'm supposed to be learning the differences between a linear search and a binary search, and the assignment is to have a user input an array and search through the array for a given number using both searches. My problem is that I know how to ask them how long they want their array to be, but I don't know how to call the getArray() method to actually ask for the contents of the array.
    My code is as follows:
    import java.util.Scanner;
    import java.util.ArrayList;
    public class Main
        private static Scanner input = new Scanner(System.in);
        public static void main (String args[])
            //creates ArrayList
            int List[];
            System.out.println("How long would you like the array to be?");
            int arrayLength = input.nextInt();
            //Initializes array list
            List = new int [arrayLength];
            System.out.println("Please enter the first value of the array");
        public static void getArray(int List[], int arrayLength)
            for(int i=0; i < arrayLength; i++) {
                 System.out.println("Enter the next value for array");
                 List[i] = input.nextInt();
         public static void printArray(int List[])
             for(int i=0; i < List.length; i++)
                 System.out.print(List[i] + " ");
    public class search
        public static int binarySearch(int anArray[], int first, int last, int value)
            int index;
            if(first > last) {
                index = -1;
            else {
                int mid = (first + last)/2;
                if(value == anArray[mid]) {
                    index = mid; //value found at anArray[mid]
                else if(value < anArray[mid]) {
                    //point X
                    index = binarySearch(anArray, first, mid-1, value);
                else {
                    //point Y
                    index = binarySearch(anArray, mid+1, last, value);
                } //end if
            } //end if
            return index;
        //Iterative linear search
        public int linearSearch(int a[], int valueToFind)
            //valueToFind is the number that will be found
            //The function returns the position of the value if found
            //The function returns -1 if valueToFind was not found
            for (int i=0; i<a.length; i++) {
                if (valueToFind == a) {
    return i;
    return -1;

    I made the changes. Two more questions.
    1.) Just for curiosity, how would I have referenced those methods (called them)?
    2.) How do I call the searches?
    import java.util.Scanner;
    import java.util.ArrayList;
    public class Main
        private static Scanner input = new Scanner(System.in);
        public static void main (String args[])
            //creates ArrayList
            int List[];
            System.out.println("How many values would you like the array to have?");
            int arrayLength = input.nextInt();
            //Initializes array list
            List = new int [arrayLength];
            //Collects the array information
            for(int i=0; i < arrayLength; i++) {
                 System.out.println("Enter a value for array");
                 List[i] = input.nextInt(); 
            //Prints the array
            System.out.print("Array: ");
            for(int i=0; i < List.length; i++)
                 System.out.print(List[i] + " ");
            //Asks for the value to be searched for
            System.out.println("What value would you like to search for?");
            int temp = input.nextInt();
            System.out.println(search.binarySearch()); //not working
    }

  • Need prelimanary activities for Solution Manager and how to use this.

    Hi
    Can anybody please inform me how to use the Solution manager and what are the prelimanary activities required,please help me step by step the configuration of Solution Manager.
    The soon reply will be appreciated
    Thanks & Regards
    Vikram GG

    Hi,
    What features you want to implement with your SOLMAN?
    For EWA, Solution Monitoring Check out these tutors.
    https://websmp107.sap-ag.de/~sapidb/011000358700006405622006E
    https://websmp107.sap-ag.de/~sapidb/011000358700006819072005E
    https://websmp107.sap-ag.de/~sapidb/011000358700005011442004E
    https://websmp107.sap-ag.de/~sapidb/011000358700004425722004E.sim
    https://websmp107.sap-ag.de/~sapidb/011000358700008968942004E.sim
    https://websmp107.sap-ag.de/~sapidb/011000358700001581382005E.sim
    https://websmp107.sap-ag.de/~sapidb/011000358700008968952004E.sim
    https://websmp107.sap-ag.de/~sapidb/011000358700001581372005E.sim
    https://websmp107.sap-ag.de/~sapidb/011000358700006936042005E.sim
    This will lead you to success in activating EWA, before these you should have your router ready and connectivity established with SAP.
    --Ragu

  • Thunderbird will not allow me to use a group email I have been using for months, why and how do I do it please?

    I set up a group email for people that I send an email to at least once a month, I updated Thunderbird when the update came up and now when I have gone to send the email it has told me that it must be in the form of name@host, not my Groups name. How do I fix this problem without having to put each individual email address in each month

    This has been reported as [https://bugzilla.mozilla.org/show_bug.cgi?id=1060901 Bug #1060901]. If you have an account on Bugzilla, please consider voting for that issue.
    Several other people have sent in the same support request as you, noting this happened after they upgraded to version 31.1.
    The exact error message is: XXXX is not a valid e-mail address because it is not of the form user@host. You must correct it before sending the e-mail.
    '''This happens when your mailing list description includes several words separated by spaces.'''
    Although not ideal, these workarounds should let you use your mailing lists until a proper fix is implemented:
    * While composing an email open the address book and select the list you are trying to send to, highlight all the names in the list and drag them to the To: box. This uses your existing data without modifying it.
    * Replacing the blanks " " between the words in such lists' descriptions with an underscore "_". This requires modifying your mailing list(s) description(s).

  • How to install the adobe creative cloud packager and how to apply the adobe ID for Admin user

    Hi team,
    Anyone has done install silently the captivate 8 using AAME? i try using this tool to create the msi but its not work.
    i saw the previous disussion on captivate 7 and they said cannot use AAME and need to use CCP.
    isit also applicable to Adobe Captivate 8? if yes cana anyone tell  me how to download the CCP?
    I already create my Adobe ID but when i try to login, its stated "Adobe does not recognize you as an authorized user of this web site."
    How can i access this site? appreciate your help

    The help I have been using (unsuccessfully) is here:
    >These links provide additional guidance for deployment support
    >Creative Cloud Packager Help: http://helpx.adobe.com/creative-cloud/packager.html
    Dave

  • I want to change my e mail adress, but it says that this e mail adress is used for rescuing mails and cannot be use as apple id. How can I change that?

    When I want to change my e mail adress, the follow sentence arise:
    This email adress is designated as your rescue email adress and cannot be used as your apple ID.
    I had another mail adress, but from today, I have just this one so it's necessary that this mail adress can be my apple ID.
    How can I change that this mail adress is my rescue email adress?

    You can edit your rescue e-mail address to whatever other email rescue address you can use or just get rid of it altogether at  ...  My Apple ID
    Do this first.   Then you can edit your main e-mail address and change it to the one you want to use.
    Read the following link carefully, if you are unsure. ://support.apple.com/kb/HT5312
    Rescue email address and how to reset Apple ID security questions
    Message was edited by: seventy one

  • Help with : How Can I know the schedule for a JOB, and How Can I Change?

    Hi
       I have a job and I know the name...I review in table TBTCO and I saw that this jobs is schedule at 11:00 AM and at 4:00 PM, but I need to change the schedule for this job..and that this job will execute al least four times during the day...I don´t know how can I change the schedule??
        I was thinking that if I  run the transaction directly I can run, Im not sure, because I try to do in QAS environment... I when I try to run the program..the system doesn´t do anything..this mean I cant execute with F8, such as if I should be complete a parameter, but all the fields are completed.
         Thank you for your help, I promese that I will gice you points for your help.
    Alice

    Thank you at all.
    I was reviewing the options that you send me, but Im confused about... if its possible edit the schedule that this job has in this moment, because if I enter the transaction SM36 or try to see SM37..in production environment I can´t see this schedule...
    And Im not sure to do the correct steps to create something new... in QAS environment..I can´´t see this job.
    All of yours help are really important
    Thank you again!
    Alice

Maybe you are looking for

  • How to implement Electronic Signatures in JSP pages

    Hi, Any one know how we can implement the Electronic Digital Signature for Ready Credit & Finance forms in sites? Please help on this topic. Regards -Soma Sekhar

  • BP for Sales; also supported for release 4.6C?

    Is it also possible to use some of the functions of the business package for Sales Distribution for connecting to an SAP system 4.6C (for example transaction VA21?)? I mean, the "business package for Sales" is only supported for the backend system up

  • TS1702 I can't download any google apps.

    I can download and use any other app just fine. When I try to hit "install app" it just goes back to "free." How to I fix this? I have restarted it and nothing has worked.

  • Vertical Tables (name value pairs)

    I inherited the maintenance of a system built on Oracle. To make it 'configurable', the user data is stored in a single table as name value pairs. What I mean is, instead of creating a new table when the end user needs a new record type, all data is

  • Can create view, but cannot create table / materialized view: Xpath is null

    Hi all, We recently moved some XML documents into the database in an XMLType column and want to query the data. I've been writing some queries and turning them into materialized views. I got to one query, and something really strange is happening. My