How field Email validate & other...

Hello

1. I have a requirement in which I need to check the field EMail i.e texinput field has in. If this isn't the case, then I need to throw exceptions.

Can someone tell me how to check the attribute of the VO.


2 there is another text input field in which I need to check that the value entered by the user should not be less than 0 and greater than 15. -Is not yet resolved

I'll do these validation on submit button.

Help, please.

Thanks in advance.

Ajay

Published by: Ajay Sharma on April 29, 2009 06:07

Published by: Ajay Sharma on April 29, 2009 20:28

Published by: Ajay Sharma on April 29, 2009 20:29

Hi Ajay,

If you manage it on submit button, then write the code in processformrrquest.

then instantiate the VO.
for example OaviewObject vo = am.findViewObject("xxx") ();
If (vo! = null)
{
While (vo.hasNext ())
{
Line = vo.next ();
If (line! = null)
{
String emailAttribute = (String) .getattribute ("emailattribute") of line;
or int index = emailAttribute.indexOf("@");
If index = 0 then error.
If (emailAttribute.contains("@")) / / or
{
throw new OAException ('error');
}

}
}
}

Thank you
Kumar

Published by: Kumar Kovela, April 29, 2009 06:33

Tags: Oracle Applications

Similar Questions

  • How to unlock my other apple if I forgot my password of previous email?

    How to unlock my other apple if I forgot my password of previous email? ... Please help. I know my apple ID and pass but when I log-in to apple.com, he says that she must be unlocked by security question and e-mail. I can't answer the security questions because I forgot those and I'm not the one who has created, for the one who created it forgot (lol). I can't get access because I forgot the password to the e-mail address. If I try to reset my email pass. Yahoo will not allow him. but in another email it help. Help, please

    If you do not access your email from backup, you should contact Apple support to unlock your Apple ID.

    Contact Apple for support and service - Apple Support

  • How can I validate the data in the control file?

    Consider that the SQLLoader reads the data entry of the path file and loads the data in the base tables up on top of the description specified in the control file.
    First, the form is created:

    create table sql_loader_1 (load_time date, digital Champ_1, Champ_2 varchar2 (10))
    Example of control file:
    load_1.CTL

    load data
    INFILE "load_1.dat", "str"\r\n"
    insert into table sql_loader_1
    (
    load_time sysdate,
    Champ_2 position (01:10).
    Champ_1 position(11:20)
    )
    Note that positions 11 to 20 are loaded in positions 1 to 10 in Champ_2 and Champ_1. The load_time field is filled with time current (sysdate) load.

    Here is the data. The name of the file (load_1.dat) had been specified with the statement for infile in the control file.

    load_1.dat

    0123456789abcdefghij
    **********##########
    foo bar
    This is a very long line
    and the next one is
    short

    declared the Champ_1 as a numeric data type, but the input data file contains the data "Sue"(position 11:20) so the sql loader adds not the record to the database instead the record is written in the bad file. But I want to validate the data of the "(position 11:20) is digital or not." How can I post this in the control file itself? If it is not possible, how can I validate it in the database? give me a sample code to explain this

    Here are two ideas.

    Idea 1: This control file will check to see if the data to be loaded in Champ_1 contains a number (including the negative and decimal).

    load data
    infile 'load_1.dat' "str '\r\n'"
    insert into table sql_loader_1
    (
    load_time sysdate,
    field_2 position( 1:10),
    field_1 position(11:20) "decode(trim(translate(:field_1,'-0123456789.',' ')),null,:field_1,-999)"
    ) 
    

    If Champ_1 is a number or null, it is passed through, as is. If there is no numeric characters (in addition to '-'and'.') a distinct value-999 will be inserted for you allow to load the rest of the columns and easy to see the lines had data that cannot be loaded in Champ_1. This idea has its flaws (a string like "... ("will always drain the .bad file)

    Idea 2: Load the data into a staging table first (or define an external table) where all columns are VARCHAR2. Then use SQL or PL/SQL to validate data in the staging table in your process to move the data into the table with the actual data types.

  • How can I keep 'Other' small data storage?

    I have a 6-16GB iPhone running on iOS 9.3.2.  A few months ago I started to run out of storage space, and I found it was used mainly by 'other' data upward.  I tried many, MANY tips given here and on other sites, in order to reduce others' my data, to the point of finally breaking and restore my iPhone to factory settings, then individually re-download my mail, applications, photos, etc. Mac support.  Initially, this great worked, now here we are a few months later, and my 'other' is back up to 7GB. I am so frustrated, that I do not understand why my 'other' data are so large. I thought by loading everything individually instead of simply to restore a backup, I would have managed to get rid of the corrupt files, etc. It is not possible to have to restore my phone settings whenever this happens, I need a more permanent solution to keep this 'other' data in check.  Any suggestions?

    You are right. Restaurant as new every time is not the way to handle this. I suspect that one of your applications creates the issue but identifying that one would be difficult, likely error. 7 GB of others is much too large, I tend to run about 1 or 2 GB maximum. These articles can help, but like I said, I think the problem is with a single application.

    http://osxdaily.com/2013/07/24/remove-other-data-storage-iPhone-iPad/

    http://www.IMore.com/how-find-and-remove-other-files-iPhone-and-iPad

  • My thunderbird (windows 8) essentially has stopped working. More than one minute to open an email - all other functions have similar delays. What should I do?

    For some reason, thunderbird (windows 8) essentially has stopped working. More than one minute to open an email - all other functions have similar delays. I tried to archive, but I get a message that says that a script has stopped working. He does the same in thunderbird safe mode. My old computer (XP) works very well. I can't find my profiles on windows 8 to rebuild the database world.

    Follow-up: McAfee was the problem. I contacted them via chat. Remotely, they took control of my computer and changed the settings. TBird works fine now.

    Thank you for all your help.

  • How many emails per day can send using apple mail, I can buy more

    How many emails a day apple allows to send from their mail server in apple mail?

    If there is a limit can be increased by purchasing permission to send more than the daily amount that they allow with apple mail?

    1 200.

    2 No.

    (138150)

  • Some how my email was requested to be removed and the link to verify that I DON'T want be removed takes me to some site randomly, please help.

    Some how my email was requested to be removed and the link to verify that I DON'T want be removed takes me to some site randomly, please help.

    Your post is a little vague, but I fear that you may have received a phishing e-mail. Please tell us all about this request but do not follow any links or give any information at this stage.

  • HOW CAN SOMEONE VALIDATE MICROSOFT WINDOWS ONLINE?

    How can someone validate windows genuine 7, 8, 10 online? / What is the secure link to validate windows genuine 7,8,10 online anytime?

    Visit our page what to look for on the Microsoft How to Tell website...

  • I have just re installed Windows XP. Windows installed after three attempts. When I turn on the computer there are three choices of Windows XP. Only the first works how to remove the other two?

    I have just re installed Windows XP. Windows installed after three attempts. When I turn on the computer there are three choices of Windows XP. Only the first works how to remove the other two?

    I have a hard drive. At least two partitions. C: 74.7 GB with 63.3 freespace
    D: 74.2 GB with 70.6 freespace
    These are my original specifications of the hard drive: 160 GB (7200 RPM) SERIAL ATA HARD DRIVE WI
    So I suspect there are at least one or more partitions hidden leaving 11.1 GB for hidden partitions!
    Windows is present on both drives C: & D:. In the directory windows on C:, the oldest entry is 19.12.12, 21.43 last 21.12.12, 22.50
    The first entry in the directory windows on D: is 19.12.12, 18.42 the last 21.12.12, 22.40
    I hope that makes sense to someone, any help gratefully received!

    As long as you have verified you dΘmarrez done on the c: / partition, Yes, you can reformat the drive D: / partition using Windows 'disk management '.

    J W Stuart: http://www.pagestart.com

  • How can I validate my copy of Windows XP

    I am trying to create a copy of mssstool32 on a cd but it takes imapi v2. but it says that I have to validate my XP first.
    How can I validate it?

    http://Windows.Microsoft.com/en-us/Windows/help/genuine/what-is-validation

    Click Validate now on the right side.

  • How can I block others access to my wireless router?

    I have performance slow and even lose connections.  I have Comcast and they have suggested that it is 'noisy' of what they see on their end.  The technology said that he receives many complaints from users of wireless router.

    Hello

    Quote: "How can I block others access to my wireless router?

    By setting up the wireless router security encryption.

    Of the weaker for wireless security, more strong capacity is.

    No security
    Switch Off SSID (even has No Security. SSID can be sniffed easily even if it is turned off)
    MAC Filtering___ (Band Aid if nothing else is available, MAC number can be easily Spoofed).
    WEP64___ (Easy, "Break" by knowledgeable people).
    WEP128___ (a little more difficult to activate, but "Piraté" too).

    -------------------
    The three above are not considered safe.
    Safe starts here at WPA.
    -------------------

    WPA-PSK__(Very Hard to Break).

    WPA-AES__(Not functionally Breakable)

    WPA2___ (not functionally breakable).

    Note 1: WPA - AES the current interpretation level entry of WPA2.

    Note 2: If you use WinXP SP3 bellows and not updated, you need to download
    the WPA2 Microsoft's fix.

    Documentation of your devices (router wireless and computer wireless card) must indicate the type of security that is available with your wireless hardware.

    All devices MUST be set to the same level of security using the same password.
    Therefore, security must be set according to what is the best possible one of the wireless devices.

    I.e. even if most of your system may be able to be configured to the maximum with WPA2, but a device is able to be configured for maximum of the WEP Protocol, to the whole system must be configured to WEP.

    If you need more security and a device (such as a wireless card that can only do WEP) is now better security for the entire network, replace with a better device.

  • Where is my book list or contacts addresses and how to import my other computer running XP?

    original title: BOOK of ADDRESSES AND CONTACTS

    I just converted to Windows 7.  Where is my book list or contacts addresses and how to import my other computer running XP?

    Hello

    The address book in Windows XP was called user name.wab. It has been used in the Outlook Express default e-mail program. You can copy/move this file .wab to the Windows 7 system.

    In Windows 7, open Windows Explorer and navigate to the C:\Users\your name\Contacts folder.

    In the toolbar, click the import button.

    In the import dialog box, select the option of Windows address book (Outlook Express contacts) .

    Click the import button and navigate to where you saved the . WAB file.

    Select that file, and then click Open.

    This will place all the e-mail addresses in the Contacts folder. This folder will be used for e-mail programs you install.

    Reference: To the inside of the Outlook Express - files and settings - OE Windows address book:
    http://www.insideoe.com/files/WAB.htm

    Concerning

  • BlackBerry Smartphones not receive emails sent to me, but can see emails I send and can send emails to others

    For some time now, my blackberry was not the receipt of emails. My Inbox ' hide sent messages "disabled, and all I can see as far as I can scroll are I sent emails. I essentially bet on the customer web (I use gmail) for e-mail, but it reached a point where I really have to be able to email from my phone again.

    Here's what I can do:

    Send emails to others of my phone

    See the emails I sent from the web client on my phone as a message

    Here's what I can't do:

    Receive emails on my phone. It's just a big shipping box.

    It may be that my credentials are wrong because it still works as an Outbox. This is no more an Inbox. I checked that I have active mobile network. and I certainly have a clear enough signal. I can use the web browser to access web pages, and it should be noted that I used to be able to send and receive e-mails even when I didn't have enough signal/cover for the web browser.

    Also check

    Options / Security Option / firewall is not active box (for the legacy of the OS 6 and 7)

    or

    Legacy OS<=>
    Options / Security Option / Segurity Server (or something like that )

    Concerning

    Note: Text translated with Google translate

  • I want to send an email manually with the fields email drives custom object? Is this possible?

    I want to send an email manually with the fields email drives custom object? Is this possible?

    Hey,.

    Yes, however, the object record Email custom fields only fill with default values. For the custom field object Record is filled, it must be sent via the event Actions or a generating program so that he knows in which case it is associated.

    Thank you...

  • How to anchor on other sensitive design objects?  (I once saw a video of adobe and can not find the link now)

    How to anchor on other sensitive design objects?  (I once saw a video of adobe and can not find the link now)

    Check the 'Smart Position' option in the advanced part of the Position properties. Drag the "anchors" that are normally found at the top and left side of the blade up to what they encounter the side of the object you want to anchor to (a blue line appears, you can release the mouse then):

Maybe you are looking for

  • iTunes and Windows 10

    I can't use, to upgrade, install, repair, or uninstall since upgrading my PC for Windows 10.  I've tried everything recommended here, Apple. Microsoft referred me to Apple. I tried to remove all Apple products that works with the exception of iTunes.

  • Bookmark point remains in the home page search bar. Do not disable. How to solve?

    On the home page of Firefox search box, one of my favorites appeared suddenly it gray. It cannot be deleted by the usual means (highlight / delete, BACKSPACE, courses, etc.), but if something is typed disappears. BUT research by activating the search

  • [ReachIt] Fail to create the ID of Lenovo

    I downloaded the build (2.0.4.0) ReachIt webstie, then install it on my T431s (8.1 Windows OS 64-bit), after you have installed successfully, it prompts the user to create a Lenovo ID, I have filled in all the required fields and click 'Sign Up', but

  • photsmart premium C410e: photo black use

    When printing simple black and white test result is very low. Black toner is full, but black picture is almost empty. Why the effect of photo black empty works test print?

  • KB2604092 and 8 other updates keep installation time and again

    A security update for the Microsoft.NET Framework 2.0 SP2 on Windows Server 2003 and Windows XP x 86 (KB2604092) and eight others in the same way, never updated. A message appears saying that I have these updates to be downloaded and installed every