hi, thx for Answer First thing is that the function is identifying the primary key column correctly. it seems Function to identify PRIMARY KEY work correct with UFT8-Table TDATAROW:SAVEPQQ( 1795 ) var2char(aTest) = "__record" TDATAROW:SAVEPQQ( ...
... checking: While the specific implementation may vary, the RTF edit control in FiveWin might provide spell checking capabilities to assist users in identifying and correcting spelling errors. Printing: The control may support printing the formatted text document. It's important to note that the ...
... I need to use those data files. Normally, since the program is located in the directory, I can use commands to find the "path" by identifying the directory and folder. The system path is then used as the "default". If I hardcode in the path, all is working. However, that ...
... the newly appended record number if successful. Result of this function is the same as normal DBAPPEND() if the setting is .f. For the purpose of identifying the deleted records, this feature uses either of two indexes: a) Any index with for condition "FOR DELETED()" eg: INDEX ON RECNO() ...
... that is used from different regions through out the State. The application knows nothing about the regional location, so I have no other way of identifying each unique location other than to use a modified .ini . It would be almost pointless to associate a user by location since that user could ...
... { || MSGINFO( "OK" ), NIL } :AddResource( "lupa2" ) :nBtnBmp := 1 END Ie identifying the type of the column after setting the xbrowse does not generate error. but in windows xp the problem continues. If he once called the ...
... Type() -- Determines the data type of a macro expression. Type( <cMacroExpr> ) --> cDataType The function returns a character string identifying the data type of <cMacroExpr> when it is evaluated using the macro operator (&) (see description). Return value Data type A Array ...
... for such summary reports doesn't need to be encrypted, so being able to encrypt just selected fields (like fields containing individual people's identifying info such as name and address, etc.) is important. 3. I'm not aware of how to use Blowfish to do whole-file encryption. 4. Blowfish can ...
... name un-encrypted .. and that works, however that leaves the last name visible to Access and ( yes ) you could make the case that addresses and identifying numbers are encrypted so therefore the personal information is secure .. perhaps 2) Another un-intended side affect is that the Employee ...
... in Windows and I feel it is good to use the newer tools. I have Visual Studio 2012 but have not tried it yet with my builds. The biggest issue is identifying all of the libraries that need to be used with the applications. Tim
... you are connecting via a logical drive or by a network path or unc such as : c:\apps\yourapp.exe g:\apps\yourapp.exe \\server\apps\yourapp.exe By identifying the location of your executable .. you can globally set your Default and anywhere in your app you can get that default by cDEFA := SET(7) ...
... From a post of Mr. Rao: In general Hash is a number derived from a large data value ( mostly character strings ) uniquely identifying it. Something like a checksum. Hash table is a table that stores such values and it gets easier to index and search on such tables. But ...
... the "email_to" field to Char it xBrowse works just fine .. however what was unique .. the twrowse fwh class did not have a problem with identifying the type .. Here is what you are looking for : Rick http://img836.imageshack.us/img836/4606/type.jpg