?
Solved

jsp and java beans

Posted on 2004-04-07
4
Medium Priority
?
183 Views
Last Modified: 2010-04-01
Hi,
Im accessing a beans value through this call:
<%=AccessV.retid()%>

Is something like this possible:
String val = <%=AccessV.retid()%>
0
Comment
Question by:Ronayne
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 92

Accepted Solution

by:
objects earned 200 total points
ID: 10780035
> Is something like this possible:
> String val = <%=AccessV.retid()%>

you'd just do:

String val = AccessV.retid();

0
 
LVL 92

Expert Comment

by:objects
ID: 10780040
thats assuming it returns a string.
if its an int for example then something like:
String val = Integer.toString(AccessV.retid());

0
 

Author Comment

by:Ronayne
ID: 10780086

Cheers
0
 
LVL 92

Expert Comment

by:objects
ID: 10780098
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
This tutorial will teach you the special effect of super speed similar to the fictional character Wally West aka "The Flash" After Shake : http://www.videocopilot.net/presets/after_shake/ All lightning effects with instructions : http://www.mediaf…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question