|
|
|
|
|
|
|
When typing compound statements ("Switch", "For" and "While", for example), the code is automatically indented to highlight the structure of the loops used in the program...... |
|
|
|
|
|
|
A Sliding Banner control can be handled through programming...... |
|
|
|
|
|
|
The project comparator is used to compare two elements and to list the differences found...... |
|
|
|
|
|
|
We are going to call the elements developed in WINDEV (project, windows, analysis, ...... |
|
|
|
|
|
|
The management of branches is used to manage several versions of the same application in parallel...... |
|
|
|
|
|
|
The following events are associated with Organizer controls:... |
|
|
|
|
|
|
The global procedures are grouped in set of procedures...... |
|
|
|
|
|
|
To pass parameters to a procedure run on a SOAP server, WINDEV is using the following structure...... |
|
|
|
|
|
|
The POP3 and SMTP protocols are protocols for email management recognized by all Internet Service Providers...... |
|
|
|
|
|
|
SAP is a widely used ERP...... |
|
|
|
|
|
|
Retrieves the map of a specific location via the Google Maps service. |
|
|
|
|
|
|
In the result of a select query, you have the ability to only display...... |
|
|
|
|
|
|
The automatic completion helps you write WLanguage code in your applications...... |
|
|
|
|
|
|
The following functions are used to manage the local storage of data in browser code.... |
|
|
|
|
|
|
The AJAX technology is available in native mode in WEBDEV and in the PHP sites developed with WEBDEV...... |
|
|
|
|
|
|
New features in WEBDEV 27 presented in the New Features brochure.... |
|
|
|
|
|
|
The "Code" pane is used to handle the procedures (local and global procedures) and the classes found in the current project ("Global procedures", "Local procedures" and "Classes" options)...... |
|
|
|
|
|
|
The following functions are used to manage bar codes:... |
|
|
|
|
|
|
The different methods to contact PC SOFT Technical Support.... |
|
|
|
|
|
|
Android applications require permissions to provide certain features that may require access to sensitive data or sensitive device functionalities...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|