What are REQUEST_NO and PAGENO parameters in WebAD url commands?

Hi,
I cannot find any documentation on what are <b>REQUEST_NO</b> and <b>PAGENO</b> parameters in WebAD url commands and how to use them.
Like in this case:
http://..../sap/bw/BEx?SAP-LANGUAGE=E&PAGENO=1&REQUEST_NO=0&CMD=PROCESS_VARIABLES&SUBCMD=VAR_SUBMIT&...
Will appreciate any hints!
Vitalik

This is a pretty normal thing to have to do, even on a form you can't guarantee all the values will be returned (unchecked checkboxes for instance won't ever send a value).
In my code I am checking to see if these params are in
the url or not:
arg1 = request.getParameter("arg1");
if(arg1 == null)
do something1;
arg2 = request.getParameter("arg2");
if(arg2 == null)
do something2;
Just change your logic a little:
// If the param is passed, get the value ...
if (request.getParameter("arg1") != null)
    arg1 = request.getParameter("arg1");
else // No parameter "arg1" passed ...
    // do something

Similar Messages

  • What are OUT_E_USER_PWD and OUT_E_ORCL_PWD parameters???

    Hi friends,
    I'm trying to find more information about pass encryption process. (Specially in Applications Environment)
    What I don't know is the meaning of two parameters...OUT_E_USER_PWD and OUT_E_ORCL_PWD.
    I have the following sentence to encrypt a user password:
    User_Exit('FND PWD TYPE="USER" '||
    'USERNAME=":USER.USER_NAME" '||
    'PASSWORD=":USER.USER_PASSWORD" '||
    'OUT_E_USER_PWD=":USER.ENCRYPTED_USER_PASSWORD" '||
    'OUT_E_ORCL_PWD=":USER.ENCRYPTED_FOUNDATION_PASSWORD" '||
    'DECRYPT="N"');
    How do this exactly works?
    I suppose it's the same as type in our spl*plus:
    sql> pwd user myuser password mypassword
    and...after we would add the new parameters... but apparently withput value.
    USER is a block in the applications form, but AFAIK ENCRYPTED_USER_PASSWORD and ENCRYPTED_FOUNDATION_PASSWORD have no values when we call this sentence...
    so.. what is the effect ?
    Any help will be appreciate about this tip. Thanks.
    Jose.

    USER.ENCRYPTED_USER_PASSWORD is carrying encrypted APPLSYS password
    have a look at Note:332577.1
    Regards
    Prashant Pathak

  • BAPI_SHIPMENT_COST_ESTIMATE  What are the min. required parameters to pass

    Hi All,
       I would like to know what are the minimum required  parameters to pass in BAPI BAPI_SHIPMENT_COST_ESTIMATE. And from which tables I can pull out that information to pass to this BAPI.
    Does this BAPI creates a shipment cost document in the system or just shows the estimate of the shipment cost.
    If it creates a shipment cost document then its good for me. but if it shows us just the estimate does it shows estimate for each delivery (total Qty, Unit Price & Total Price). 
    What will be the item category it will pick. I like to see it picks  basic price related item category.
    Does any body has used this bapi ?
    Appreciate your fast reply.
    Regards,
    Leona

    Hello, I´ll try to answer your question:
    1. is it possible to run the bapi without actual shipment number and the shipment ( & cost ) will be created in simulation mode ?
    I think that the bapi only run with external shipment number and only run in simulation mode, that´s mean the bapi can not create any shipment and cost document, if you want to create a shipment use BAPI_SHIPMENT_CREATE, to create a cost document I don´t know if there is a bapi but you can create easily with transaction VI01 (batch-input)
    The shipment number that you use to call the bapi is a ficticious number always between external range indicated in field V_TVTK-NUMKE with the shipment type that you use.
    2. is it possible to perform estimation to inbound shipments ?
    Yes it´s depend on the shipment type. In standard system 0010 is used
    In the example that I have I use an inbound delivery
    3. does the bapi creates shipment and scd in simulate mode like transaction VICI ( from sales order ) ?
    I think that the bapi only run in simulation mode and it can not create any document
    4. is there any problem if i customized my scd item categories to open manualy ?
    I think that the bapi needs to work properly automatic iten categories
    can you please post sample code ( or any other doc's ) for this bapi ?
    I send you a document with an example if you give me an e-mail because I don´t know how to attach a word document
    Best regards,

  • What are the content conversion parameters for this structure

    Hi All,
    The below file is the text file. what are the content conversion parameters are required and what is the structure to create in the IR to convert into xml.
    Schedule D - District/Port List (by District Code) [Produced13APR11]
    District |    Port      |    Name
    Code     |    Code      |
    01       |              |    PORTLAND, ME
             |    0101      |    PORTLAND, ME
             |    0102      |    BANGOR, ME
             |    0103      |    EASTPORT, ME
             |    0104      |    JACKMAN, ME
             |    0105      |    VANCEBORO, ME
             |    0106      |    HOULTON, ME
             |    0107      |    FORT FAIRFIELD, ME
             |    0108      |    VAN BUREN, ME
             |    0109      |    MADAWASKA, ME
             |    0110      |    FORT KENT, ME
             |    0111      |    BATH, ME
             |    0112      |    BAR HARBOR, ME
             |    0115      |    CALAIS, ME
             |    0118      |    LIMESTONE, ME
             |    0121      |    ROCKLAND, ME
             |    0122      |    JONESPORT, ME
             |    0127      |    BRIDGEWATER, ME
             |    0131      |    PORTSMOUTH, NH
             |    0132      |    BELFAST, ME
             |    0152      |    SEARSPORT, ME
             |    0181      |    LEBANON AIRPORT
             |    0182      |    MANCHESTER USER FEE AIRPORT, NH
    02       |              |    ST. ALBANS, VT
             |    0201      |    ST. ALBANS, VT
             |    0203      |    RICHFORD, VT
             |    0206      |    BEECHER FALLS, VT
             |    0207      |    BURLINGTON, VT
             |    0209      |    DERBY LINE, VT
             |    0211      |    NORTON, VT
             |    0212      |    HIGHGATE SPRINGS/ALBURG

    since in this case you dont seem to have a key value to figure out what your header is, it is better to go for a two level mapping. i.e first read all the data - each line as an xml tag. and in the first mapping group it as required and then use it for your original mapping.
    Regards,
    Ninu

  • What are the AM Tuning parameters need to be set for 500 concurrent users

    Hi All,
    We are using JDEVADF_11.1.1.5.0.
    What are the exact AM parameters(Pooling and Scalability tab) to be set when we planned for 500+ concurrent users?
    Along with this do we need to set any parameters at weblogic server level, if any please give inputs.
    Any input's would be appreciated.
    Thanks in advance.
    Regards,
    Dinesh

    We can?t give you exact numbers as there are many factors influencing the performance. In hte end you have to make a load test to find the right set of parameters. A good starting point is Andrejus's blog Andrejus Baranovskis's Blog: Stress Testing Oracle ADF BC Applications - Internal Connections and  Andrejus Baranovskis's Blog: Stress Testing Oracle ADF BC Applications - Do Connection Pooling and TXN Disconnect Level
    Timo

  • What are Conversions and Extensions

    Hey ,
         I want to know what are Conversions and Extensions. Can i get any material where i can get information on these.
    Thanks in advance

    The conversion programs were used to take the extract data from the legacy system and re-format for SAP and load the data into SAP.
    Conversions are one-time programs used to transfer data from the legacy system into SAP. For example, you can transfer master data like vendors, customers etc.
    SAP provides enhancement to BAPIs thru EXTENSION IN AND EXTENSION OUT .these are structure parameters.suppose example: one BAPI released to update the mara table.then u modified the table mara thru append structure.this changes will not be reflected in BAPIs.So thats why in that case we have to use EXTENSION IN AND EXTENSION OUT structures to fill and work.

  • 0.41GB of my iPod Touh 4G' is taken up by something called 'Others'. What are 'Others' and can they be deleted or are they an essential part of the iPod and embedded in it? If not essential how do I go about deleting it to enable me to add other pictures

    0.41GB of my iPod Touch 4G's capacity is taken up by something callked 'Others'. What are 'Others' and will it be o.k to delete them? If so how do I go about doing it as there is no trace of a file on either iTunes or my iPod?

    Other content is typically miscellaneous data used by applications you have installed - could be save data (e.g. for games), or documents you've created. There's no easy way to determine precisely what it is, but the only way to clear it is to either delete it from within the respective application, or remove the associated application altogether - neither of which are typically practical.

  • What are the content conversion parameters

    Hi All
    This link contains the text file.
    http://www.census.gov/foreign-trade/schedules/d/dist.txt
    what are the content conversion parameters are required to convert that text to xml.

    <sen_dt>
         <prefix>
              <heads>
                   <dc>               
                   <pc>
                   <name>
              <main>
                   <dcno>
                   <pcno>
                   <name1>
    <rec_dt>
         <prefix>
              <District_code>             District code      optional
              <port_code>              port code          1
              <name>                   name              
         <main>
              <District_code_no>
              <port_code_no>
              <name1>
    content conversion
         document name:<sen_dt>
         document namespace:http::----
         document offset:--
         recordset name:input
         recordset structure:heads,1,main,*
         recordset sequence:Ascending
         recordset per message:----
         keyfield name:---
    prefix.fieldfixedlengths:---
    prefix.endSeparator:---
    prefix.fieldNames;---
    prefix.keyFieldvalue:--
    prefix.keyFieldlnStructure:---
    main.fieldFixedLengths:9,
    main.fieldSeparator:|
    main.endSeparator:'nl'
    main.fieldNames:district code,port code,name
    main.keyFieldValue:
    main.keyFieldlnStructure:

  • What are ROWID and ROWNUM? Are they stored in database and where?

    Hi All,
    can anybody please answer this question
    What are ROWID and ROWNUM? Are they stored in database and where?
    Thanks,
    Srini

    ROWID can be thought of as a pointer to the physical location (on disk) of the (table) row.
    From a ROWID value, Oracle can extract the file, block-within-that-file and offset-of-the-row-within-that-block. Using these, Oracle can directly access a disk block to retrieve a row.
    ROWNUM is a just sequence number of a row within a result set of a query.
    As said by other repliers, both are not stored. They are 'constructed' when you reference them inside a query.

  • What are high and low values in sharepoint 2013 user permissions?

    So I hit this api:
    http://win-a3q7ml82p8f/sharepoint_site/_api/web/roledefinitions/
    And got the different high and low values. But I am not clear with what they mean:
    For eg:
    High: 176, Low: 138612833
    and
    High: 176, Low: 138612801
    So for different values of Low how does it change the permissions?
    For 176 its binary is 10110000. So looking at this table here: http://www.dctmcontent.com/sharepoint/Articles/Permissions%20and%20Mask%20Values.aspx
    I can understand that 176 would mean the following set of permissions:
    DeleteVersions
    OpenItems
    ApproveItems
    But what's confusing me is, that user has OpenItems permissions but not ViewListItems permission? Am I wrong in understanding this?
    Also how does the value of Low change the overall user permissions?
    Note: I looked at this answer: http://social.msdn.microsoft.com/Forums/sharepoint/en-US/9d6df168-e8f5-4323-8c34-0646c03eff68/rest-api-what-are-high-and-low-in-effectivebasepermissions-and-getusereffectivepermissions?forum=sharepointdevelopment
    But honestly I cant understand what that means. Can someone help please?

    check this blog may explain you...
    http://jamestsai.net/Blog/post/Understand-SharePoint-Permissions---Part-1-SPBasePermissions-in-Hex2c-Decimal-and-Binary---The-Basics.aspx
    Please remember to mark your question as answered &Vote helpful,if this solves/helps your problem. ****************************************************************************************** Thanks -WS MCITP(SharePoint 2010, 2013) Blog: http://wscheema.com/blog

  • Satellite A100-153: What are verical and horizontal refresh rates for my display

    How can I found out what are verical and horizontal refresh rates for my display?

    Hi
    Do you mean the vertical and horizontal display resolution???
    Anyway all informations should be listed in the user manual.
    I dont know exactly what appendix is it but it must be placed somewhere at the end of the user manual.
    Such infos are listed also in my user manual which was delivered and preinstalled on my Satellite notebook.

  • What are valid and invalid email address characters

    What are valid and invalid email address characters in Exchange 2010, for example can you have Conan.O'[email protected] is there a document that shows the valid and invalid sysmbols?

    Hi
        The format of email addresses is
    local-part@domain where the local-part may be up to 64 characters long and the
    domain name may have a
    maximum of 253 characters - but the maximum 256 characters length of a forward or reverse path restricts the entire email address to be no more than 254 characters.<sup id="cite_ref-0">[1]</sup>
    The formal definitions are in RFC 5322 (sections 3.2.3
    and 3.4.1) and RFC 5321 - with a more readable form given in
    the informational RFC 3696<sup id="cite_ref-1">[2]</sup>
    and the associated errata.
    Local part
    The local-part of the email address may use any of these
    ASCII characters
    RFC 5322 Section
    3.2.3:
    Uppercase and lowercase English letters (a–z, A–Z) (ASCII: 65-90, 97-122)
    Digits
    0 to
    9 (ASCII: 48-57)
    Characters
    !#$%&'*+-/=?^_`{|}~ (ASCII: 33, 35-39, 42, 43, 45, 47, 61, 63, 94-96, 123-126)
    Character
    . (dot, period, full stop) (ASCII: 46) provided that it is not the first or last character, and
    provided also that it does not appear two or more times consecutively (e.g. [email protected] is not allowed.).
    Special characters are allowed with restrictions. They are:
    o   
    Space and
    "(),:;<>@[\] (ASCII: 32, 34, 40, 41, 44, 58, 59, 60, 62, 64, 91-93)
    The restrictions for special characters are that they must only be used when contained between quotation marks, and that 3 of them (The
    space, backslash \ and
    quotation mark " (ASCII: 32, 92, 34)) must also be preceded by a backslash
    \ (e.g.
    A quoted string may exist as a dot separated entity within the local-part, or it may exist when the outermost quotes are the outermost characters of the local-part
    (e.g. abc."defghi"[email protected] or
    "abcdefghixyz"@example.com are allowed. Conversely,
    abc"defghi"[email protected] is not; neither is
    abc\"def\"[email protected]). Quoted strings and characters however, are not commonly used.
    RFC 5321 also
    warns that "a host that expects to receive mail SHOULD avoid defining mailboxes where the Local-part requires (or uses) the Quoted-string form".
    The local-part "postmaster" is treated specially - it is case-insensitive, and should be forwarded to the server's administrator. Technically all other local-parts
    are case sensitive, therefore [email protected] and [email protected] specify different mailboxes. However most organizations treat uppercase and lowercase letters as equivalent, and also do not allow use of the technically valid characters
    (space, ? and ^). Organizations are free to restrict the forms of their own email addresses as desired, e.g.,
    Windows Live Hotmail,
    for example, only allows creation of email addresses using alphanumerics, dot (.), underscore (_)
    and hyphen (-).<sup id="cite_ref-2">[3]</sup>
    Systems that send mail must be capable of handling outgoing mail for all valid addresses. Contrary to the relevant standards, some defective systems treat certain
    legitimate addresses as invalid and fail to handle mail to these addresses. Hotmail, for example, refuses to send mail to any address containing any of the following standards-permissible characters:
    !#$%*/?^`{|}~
    Domain part
    The domain name part of an email address has to conform to strict guidelines: it must match the requirements for a
    hostname,
    consisting of letters, digits, hyphens and dots. In addition, the domain part may be an
    IP address
    literal, surrounded by square braces, such as jsmith@[192.168.2.1], although this is rarely seen except
    in email spam.
    Examples
    Valid email addresses
    <tt>[email protected]</tt>
    <tt>[email protected]</tt>
    <tt>[email protected]</tt>
    <tt>much."more\ unusual"@example.com</tt>
    <tt>very.unusual."@"[email protected]</tt>
    <tt>very."(),:;<>[]".VERY."very@\\\ \"very"[email protected]</tt>
    Invalid email addresses
    <tt>Abc.example.com</tt> (an @ character must separate the local and domain parts)
    <tt>[email protected]</tt> (character dot(.) is last in local part)
    <tt>[email protected]</tt> (character dot(.) is double)
    <tt>A@b@[email protected]</tt> (only one @ is allowed outside quotation marks)
    <tt>a"b(c)d,e:f;g<h>i[j\k][email protected]</tt> (none of the special characters in this local part
    is allowed outside quotation marks)
    <tt>just"not"[email protected]</tt> (quoted strings must be dot separated, or the only element making
    up the local-part)
    <tt>this is"not\[email protected]</tt> (spaces, quotes, and backslashes may only exist when within
    quoted strings and preceded by a slash)
    <tt>this\ still\"not\\[email protected]</tt> (even if escaped (preceded by a backslash), spaces, quotes,
    and backslashes must still be contained by quotes)
    Terence Yu
    TechNet Community Support

  • What are advantage and disadvantage for Physical Standy and Logical Standby

    HI,
    What are advantage and disadvantage for Physical Standy and Logical Standby configuration?
    Thanks
    Ken

    Logical standby database
    The key advantage for logical standby databases is that they're opened read/write, even while they're in
    applied mode. That is, they can be used to generate reports and the like. It is indeed a fully functional
    database. Also, additional indexes, materialized views and so on can be created.
    However (this being a disadvantage) not all datatypes are supported.
    Oracle (or more exactly the log apply services) uses the primary database's redo log, transforms them into
    SQL statements and replays them on the logical standby database.
    Physical standby database
    A physical standby database is a byte for byte exact copy of the primary database. This also means that
    rowids stay the same in a physical standby database environment.
    Oracle (or more exactly the log apply services) uses the primary database's redo log to recover the
    physical database.
    A physical standby database might be opened read only; however, the received logs are in this case not
    applied. When the logs are applied, the database is not accessible (it is then in a managed recovery state).
    Regards,

  • What are Before and After Images ?

    Hello Masters,
    Best wishes to all.
    For the past one week I've learnt many concepts from SDN, got all my doubts clarified.
    On the same roll, I have one more question
    What are Before and After Images ?
    Where do we come across these terms ?
    Could you please explain with an example ?
    I always thank my replies in points 
    Thanks in advance...

    <b>Hai</b>....
    <u><b>Before and After Images:</b></u>
    This Term is Used in the " Change Log "....
    Change Log is one of the Table used in ODS....
    That means the Changes in Running Request in ODS....
    Example:
    If you Enter the Request to " New Table" after activation the Request will be Deleted From the Table, You can see that in Change log......
    <i><b>Assign Points If It Halps</b></i>....
    <u><b>BalajeeKannan</b></u>

  • What are Validation and simulator

    can any one explain what are Validation and Simulators are ???
    what is there importance and how they work in SAP ??
    Regards,
    Milindkumar

    Are you referring to validation rules and simulations? Whereby validations allow the checking of values and combinations of data as they are being entered in SAP. Because the data is validated before it is posted, only correct information enters the system. For example if you have a cost center X that should not post to account Y. You create a validation that checks to see if cost center X is entered whether the account is Y. If the account is Y the validation will stop the entry from being made.
    Simulations normally are when data is checked for accuracy or verfied before posting. Simulations usually allow the verification of data by displaying that entries that will post or will be created only after the post button or process occurs.

Maybe you are looking for

  • IPod Touch with Composite AV Cable: Issues

    I purchased the new $50 composite AV cable when it was released a few months back. I've been using it frequently with no real issues (whenever I play a video, my iPod recognizes that it is connected to a TV and prompts me to choose whether or not to

  • IPhoto will not open due to lack of application memory

    I am trying to open iPhoto to move some photos to an external drive. iPhoto is not opening as it appears I am running out of Application Memory. I have run the disk utilities and everything is fine. I have closed all other applications so that is the

  • DMM LDAP Administrator Rights

    In the documentation for DMM 5.2.X, there doesn't seem to be any information on what rights need to be given to the Administrator for the LDAP integration.  The environment that I am configuring for is very security conscience and will want to give t

  • How bad is the recent hacking problem?

    Should I wait for a fix before using my iMac?

  • HOW DO I REMOVE FROM THE CONTACT A GROUP?

    HOW DO YOU REMOVE A GROUP NAME FROM CONTACTS?