What are "A1" and "A2" in Tree SQL?

ApEx generates something like the following for trees. What are "A1" and "A2" for?
select "EMPLOYEE_ID" id,
       "MANAGER_ID" pid,
       "LAST_NAME" name,
       'f?p=&APP_ID.:4:&SESSION.::NO::P4_COUNTRY_ID:'||"EMPLOYEE_ID" link,
       null a1,
       null a2
from "#OWNER#"."EMPLOYEES"Mike

Posted the above question thru guest login... posting again to track it..
How do i refer to the values of A1 and A2 in javascript in the <SCRIPT> tag?
Also if i want to compare the value of A1 to a value in a Hidden field using javascript code. How do i do it?

Similar Messages

  • What are advantage and disadvantage for Physical Standy and Logical Standby

    HI,
    What are advantage and disadvantage for Physical Standy and Logical Standby configuration?
    Thanks
    Ken

    Logical standby database
    The key advantage for logical standby databases is that they're opened read/write, even while they're in
    applied mode. That is, they can be used to generate reports and the like. It is indeed a fully functional
    database. Also, additional indexes, materialized views and so on can be created.
    However (this being a disadvantage) not all datatypes are supported.
    Oracle (or more exactly the log apply services) uses the primary database's redo log, transforms them into
    SQL statements and replays them on the logical standby database.
    Physical standby database
    A physical standby database is a byte for byte exact copy of the primary database. This also means that
    rowids stay the same in a physical standby database environment.
    Oracle (or more exactly the log apply services) uses the primary database's redo log to recover the
    physical database.
    A physical standby database might be opened read only; however, the received logs are in this case not
    applied. When the logs are applied, the database is not accessible (it is then in a managed recovery state).
    Regards,

  • 0.41GB of my iPod Touh 4G' is taken up by something called 'Others'. What are 'Others' and can they be deleted or are they an essential part of the iPod and embedded in it? If not essential how do I go about deleting it to enable me to add other pictures

    0.41GB of my iPod Touch 4G's capacity is taken up by something callked 'Others'. What are 'Others' and will it be o.k to delete them? If so how do I go about doing it as there is no trace of a file on either iTunes or my iPod?

    Other content is typically miscellaneous data used by applications you have installed - could be save data (e.g. for games), or documents you've created. There's no easy way to determine precisely what it is, but the only way to clear it is to either delete it from within the respective application, or remove the associated application altogether - neither of which are typically practical.

  • What are ROWID and ROWNUM? Are they stored in database and where?

    Hi All,
    can anybody please answer this question
    What are ROWID and ROWNUM? Are they stored in database and where?
    Thanks,
    Srini

    ROWID can be thought of as a pointer to the physical location (on disk) of the (table) row.
    From a ROWID value, Oracle can extract the file, block-within-that-file and offset-of-the-row-within-that-block. Using these, Oracle can directly access a disk block to retrieve a row.
    ROWNUM is a just sequence number of a row within a result set of a query.
    As said by other repliers, both are not stored. They are 'constructed' when you reference them inside a query.

  • What are high and low values in sharepoint 2013 user permissions?

    So I hit this api:
    http://win-a3q7ml82p8f/sharepoint_site/_api/web/roledefinitions/
    And got the different high and low values. But I am not clear with what they mean:
    For eg:
    High: 176, Low: 138612833
    and
    High: 176, Low: 138612801
    So for different values of Low how does it change the permissions?
    For 176 its binary is 10110000. So looking at this table here: http://www.dctmcontent.com/sharepoint/Articles/Permissions%20and%20Mask%20Values.aspx
    I can understand that 176 would mean the following set of permissions:
    DeleteVersions
    OpenItems
    ApproveItems
    But what's confusing me is, that user has OpenItems permissions but not ViewListItems permission? Am I wrong in understanding this?
    Also how does the value of Low change the overall user permissions?
    Note: I looked at this answer: http://social.msdn.microsoft.com/Forums/sharepoint/en-US/9d6df168-e8f5-4323-8c34-0646c03eff68/rest-api-what-are-high-and-low-in-effectivebasepermissions-and-getusereffectivepermissions?forum=sharepointdevelopment
    But honestly I cant understand what that means. Can someone help please?

    check this blog may explain you...
    http://jamestsai.net/Blog/post/Understand-SharePoint-Permissions---Part-1-SPBasePermissions-in-Hex2c-Decimal-and-Binary---The-Basics.aspx
    Please remember to mark your question as answered &Vote helpful,if this solves/helps your problem. ****************************************************************************************** Thanks -WS MCITP(SharePoint 2010, 2013) Blog: http://wscheema.com/blog

  • Satellite A100-153: What are verical and horizontal refresh rates for my display

    How can I found out what are verical and horizontal refresh rates for my display?

    Hi
    Do you mean the vertical and horizontal display resolution???
    Anyway all informations should be listed in the user manual.
    I dont know exactly what appendix is it but it must be placed somewhere at the end of the user manual.
    Such infos are listed also in my user manual which was delivered and preinstalled on my Satellite notebook.

  • What are valid and invalid email address characters

    What are valid and invalid email address characters in Exchange 2010, for example can you have Conan.O'[email protected] is there a document that shows the valid and invalid sysmbols?

    Hi
        The format of email addresses is
    local-part@domain where the local-part may be up to 64 characters long and the
    domain name may have a
    maximum of 253 characters - but the maximum 256 characters length of a forward or reverse path restricts the entire email address to be no more than 254 characters.<sup id="cite_ref-0">[1]</sup>
    The formal definitions are in RFC 5322 (sections 3.2.3
    and 3.4.1) and RFC 5321 - with a more readable form given in
    the informational RFC 3696<sup id="cite_ref-1">[2]</sup>
    and the associated errata.
    Local part
    The local-part of the email address may use any of these
    ASCII characters
    RFC 5322 Section
    3.2.3:
    Uppercase and lowercase English letters (a–z, A–Z) (ASCII: 65-90, 97-122)
    Digits
    0 to
    9 (ASCII: 48-57)
    Characters
    !#$%&'*+-/=?^_`{|}~ (ASCII: 33, 35-39, 42, 43, 45, 47, 61, 63, 94-96, 123-126)
    Character
    . (dot, period, full stop) (ASCII: 46) provided that it is not the first or last character, and
    provided also that it does not appear two or more times consecutively (e.g. [email protected] is not allowed.).
    Special characters are allowed with restrictions. They are:
    o   
    Space and
    "(),:;<>@[\] (ASCII: 32, 34, 40, 41, 44, 58, 59, 60, 62, 64, 91-93)
    The restrictions for special characters are that they must only be used when contained between quotation marks, and that 3 of them (The
    space, backslash \ and
    quotation mark " (ASCII: 32, 92, 34)) must also be preceded by a backslash
    \ (e.g.
    A quoted string may exist as a dot separated entity within the local-part, or it may exist when the outermost quotes are the outermost characters of the local-part
    (e.g. abc."defghi"[email protected] or
    "abcdefghixyz"@example.com are allowed. Conversely,
    abc"defghi"[email protected] is not; neither is
    abc\"def\"[email protected]). Quoted strings and characters however, are not commonly used.
    RFC 5321 also
    warns that "a host that expects to receive mail SHOULD avoid defining mailboxes where the Local-part requires (or uses) the Quoted-string form".
    The local-part "postmaster" is treated specially - it is case-insensitive, and should be forwarded to the server's administrator. Technically all other local-parts
    are case sensitive, therefore [email protected] and [email protected] specify different mailboxes. However most organizations treat uppercase and lowercase letters as equivalent, and also do not allow use of the technically valid characters
    (space, ? and ^). Organizations are free to restrict the forms of their own email addresses as desired, e.g.,
    Windows Live Hotmail,
    for example, only allows creation of email addresses using alphanumerics, dot (.), underscore (_)
    and hyphen (-).<sup id="cite_ref-2">[3]</sup>
    Systems that send mail must be capable of handling outgoing mail for all valid addresses. Contrary to the relevant standards, some defective systems treat certain
    legitimate addresses as invalid and fail to handle mail to these addresses. Hotmail, for example, refuses to send mail to any address containing any of the following standards-permissible characters:
    !#$%*/?^`{|}~
    Domain part
    The domain name part of an email address has to conform to strict guidelines: it must match the requirements for a
    hostname,
    consisting of letters, digits, hyphens and dots. In addition, the domain part may be an
    IP address
    literal, surrounded by square braces, such as jsmith@[192.168.2.1], although this is rarely seen except
    in email spam.
    Examples
    Valid email addresses
    <tt>[email protected]</tt>
    <tt>[email protected]</tt>
    <tt>[email protected]</tt>
    <tt>much."more\ unusual"@example.com</tt>
    <tt>very.unusual."@"[email protected]</tt>
    <tt>very."(),:;<>[]".VERY."very@\\\ \"very"[email protected]</tt>
    Invalid email addresses
    <tt>Abc.example.com</tt> (an @ character must separate the local and domain parts)
    <tt>[email protected]</tt> (character dot(.) is last in local part)
    <tt>[email protected]</tt> (character dot(.) is double)
    <tt>A@b@[email protected]</tt> (only one @ is allowed outside quotation marks)
    <tt>a"b(c)d,e:f;g<h>i[j\k][email protected]</tt> (none of the special characters in this local part
    is allowed outside quotation marks)
    <tt>just"not"[email protected]</tt> (quoted strings must be dot separated, or the only element making
    up the local-part)
    <tt>this is"not\[email protected]</tt> (spaces, quotes, and backslashes may only exist when within
    quoted strings and preceded by a slash)
    <tt>this\ still\"not\\[email protected]</tt> (even if escaped (preceded by a backslash), spaces, quotes,
    and backslashes must still be contained by quotes)
    Terence Yu
    TechNet Community Support

  • What are Before and After Images ?

    Hello Masters,
    Best wishes to all.
    For the past one week I've learnt many concepts from SDN, got all my doubts clarified.
    On the same roll, I have one more question
    What are Before and After Images ?
    Where do we come across these terms ?
    Could you please explain with an example ?
    I always thank my replies in points 
    Thanks in advance...

    <b>Hai</b>....
    <u><b>Before and After Images:</b></u>
    This Term is Used in the " Change Log "....
    Change Log is one of the Table used in ODS....
    That means the Changes in Running Request in ODS....
    Example:
    If you Enter the Request to " New Table" after activation the Request will be Deleted From the Table, You can see that in Change log......
    <i><b>Assign Points If It Halps</b></i>....
    <u><b>BalajeeKannan</b></u>

  • What are Conversions and Extensions

    Hey ,
         I want to know what are Conversions and Extensions. Can i get any material where i can get information on these.
    Thanks in advance

    The conversion programs were used to take the extract data from the legacy system and re-format for SAP and load the data into SAP.
    Conversions are one-time programs used to transfer data from the legacy system into SAP. For example, you can transfer master data like vendors, customers etc.
    SAP provides enhancement to BAPIs thru EXTENSION IN AND EXTENSION OUT .these are structure parameters.suppose example: one BAPI released to update the mara table.then u modified the table mara thru append structure.this changes will not be reflected in BAPIs.So thats why in that case we have to use EXTENSION IN AND EXTENSION OUT structures to fill and work.

  • What are Validation and simulator

    can any one explain what are Validation and Simulators are ???
    what is there importance and how they work in SAP ??
    Regards,
    Milindkumar

    Are you referring to validation rules and simulations? Whereby validations allow the checking of values and combinations of data as they are being entered in SAP. Because the data is validated before it is posted, only correct information enters the system. For example if you have a cost center X that should not post to account Y. You create a validation that checks to see if cost center X is entered whether the account is Y. If the account is Y the validation will stop the entry from being made.
    Simulations normally are when data is checked for accuracy or verfied before posting. Simulations usually allow the verification of data by displaying that entries that will post or will be created only after the post button or process occurs.

  • In preferences- saved passwords for Chrome://weave (Mozilla Services password) and Mozilla Services Encription Passphrase) what are these and are they needed?

    In preferences- saved passwords for Chrome://weave (Mozilla Services password) and Mozilla Services Encription Passphrase) what are these and are they needed?

    They are only needed for firefox sync.

  • What are these and what are they useful for?: and

    I have seen these symbols being used in Java: << and >>, what are they and what do they do?
    Thank you.

    As DrQuincy asks how is this of use over multiplying
    and dividing?In your processor there are often different instructions for shifting, multiplying, and deleteing. Typically the shifting instructions take less time to execute and so using the shifting operator will be faster than multiplying. This assumes the compiler doesn't recognize the situation and optimize it out though.
    The >>,<<,>>>, &,|,and ^ operators are mainly useful when you need to deal with individual bits of data. For instance if you are talking to another system (thats not java) that uses a different method of storing numbers (little endian/big endian etc.), or doing something such as creating parity data for error correction. There are lots of things to do, but most a low level and its rare when you need to use them.

  • What is a gateway proxy?? what are synchronous and asynchronous calls?

    bapis are rfc enabled. but are there any other rfc's  available in sap? what is a gateway proxy?? what are synchronous and asynchronous calls?

    Hello:
    Lets st art at the beginning.
    There are NO documented viruses that affect a Mac running OS X - none (there are instances of Malware).
    Gateway GEO-IP/BOTNET Alert
    This is a Youtube video that explains what you have (I assume you installed it somehow) on your computer:
    http://www.youtube.com/watch?v=JwRi2me2hSk
    For openers, I would uninstall any A/V software you have put on your system.  It is certainly possible that that junk has put some other stuff on your computer.
    I'm also afraid my computer might have been hacked?
    Highly unlikely.
    Barry

  • What are SCMRWBS and SCMEMWCL for ?

    Hello all,
    I'm now filling the installation parameter sheet of SCM(APO) system.
    This sheet has two paraemters whose content I'm not sure of.
    That is, software units SCMRWBS and SCMEMWCL.
    What are SCMRWBS and SCMEMWCL for ?
    Do we need to install them while my project will use PP/DS and BP modules ?
    And can we see whether these usage types installed or not via SAPGUI ?
    I beg your help !
    Thank you for your cooperation in advance.
    Regards,

    Hi Hideki,
    SCMRWBS is for SCM Replenishment Workbench. If you are using F&R modules of mySAP SCM suite, then this component is neccessary.
    Smilarly, SCMEMWCL is SCM Web Communication Layer for Event Management. Again this is part of mySAP SCM, but belongs to Event Management module.
    As far as PP/DS is concerned these two components are not neccessary. However, these components may have some dependencies on other applications / modules. Please check with SAP for any specific inputs if you have any concern over installing them onto your system.
    Thanks,
    Rajesh
    >
    Hideki Kozai wrote:
    > Hello all,
    >
    > I'm now filling the installation parameter sheet of SCM(APO) system.
    > This sheet has two paraemters whose content I'm not sure of.
    > That is, software units SCMRWBS and SCMEMWCL.
    > What are SCMRWBS and SCMEMWCL for ?
    > Do we need to install them while my project will use PP/DS and BP modules ?
    > And can we see whether these usage types installed or not via SAPGUI ?
    >
    > I beg your help !
    >
    > Thank you for your cooperation in advance.
    >
    > Regards,

  • What are Struts and how it is used in SAP

    Hi
    can anyone give a idea that what are struts and how it is used in SAP
    Regards
    JM

    Hi John,
    In this case google.com really us your friend - Struts is not an SAP technology, rather it is an MVC development paradigm (love using that word for Java.  There are lots of useful websites with generic information around struts as well as a number of good books available from Amazon for instance.
    As far as Struts and SAP goes - SAP use Struts for their Internet Sales CRM Webshop application.  Of course, like anything else from SAP it has been modified slightly but is essentially the same.
    Gareth.

Maybe you are looking for

  • Mail attachments don't work iphone

    I have three users who updated their phones to 7.0.4.  After doing so, half of the email attachments don't show up in emails.  Instead, they get a "this message has no content."  It happens with different email senders and different attachment file t

  • FileVault for a 2-partition system

    My MacBook disk has 2 main partitions:  OSX and Data.  Lion is installed to the OSX partition and my user account was updated to point to its Home directory on the Data partition.  My expectation is that when I enabled FileVault, only the OSX partiti

  • HT202912 How do I remove Java 1.7 and replace this with Java 1.6.0_65?

    I need to get back to  an older JRE specifically Java 1.6.0_65. Right now I have Java 1.7.-_71-b14. I've tried the instruction in the terminal - sudo rm -fr /Library/Internet\ Plug-Ins/JavaAppletPlugin.plugin That doesn't work. In Terminal mode, a "j

  • Profit centre missing while changing in item code

    Dear Guru, While changing any fields in MM i'm getting profit center is not defined error,if i give any profit center system is saying stock exists for same. Please guide me how to resplve. Thanks Netaji thorat

  • Default dashBoard for Group

    Hi Gurus, How to set up default dashboard for a group of users..if i have 3 groups like g1,g2,g3..users need to get default page based on the group they belong to.