|
|
|
|
|
|
|
To optimize the style of your screens, WINDEV and WINDEV Mobile allow you to use...... |
|
|
|
|
|
|
The Special paste command is used to explicitly choose the format in which the clipboard content will be pasted in the window editor...... |
|
|
|
|
|
|
An image can be used to easily define the shape of a window...... |
|
|
|
|
|
|
You are interested by a window found in a non-WINDEV application?...... |
|
|
|
|
|
|
A maximized window occupies the entire screen of the mobile device.... |
|
|
|
|
|
|
To use the software factory, a coordinator must be installed on a computer as well as the different robots that will perform the tasks found in the action plans.... |
|
|
|
|
|
|
The "Debugger trace" shows the messages displayed in the trace window during the last application test...... |
|
|
|
|
|
|
The MDI windows must respect some constraints specific to the MDI applications...... |
|
|
|
|
|
|
All the elements handled by a project (window, report, classes, set of procedures, queries, ...... |
|
|
|
|
|
|
The window that opens another window is called parent window ; the windows opened by the parent window are called child windows...... |
|
|
|
|
|
|
A WINDEV project and all its elements compatible with WINDEV Mobile (analysis, windows, classes, sets of procedures, queries, ...... |
|
|
|
|
|
|
All the elements handled by a project (window, report, classes, set of procedures, queries, ...... |
|
|
|
|
|
|
Four versions are available for the SCM repository...... |
|
|
|
|
|
|
Modal, non-modal or MDI windows... |
|
|
|
|
|
|
The windows represent the main interface of a WINDEV application...... |
|
|
|
|
|
|
In France, electronic invoicing has become mandatory for invoicing government services...... |
|
|
|
|
|
|
Defines a new holiday period on a row in a Gantt Chart column of a Table or TreeView Table control. |
|
|
|
|
|
|
Indicates if a day of the week is a working day in a Gantt Chart column in a Table or TreeView Table control. |
|
|
|
|
|
|
The Table controls can be 100% AJAX...... |
|
|
|
|
|
|
When using an Internet application, the data circulating between the computer of the Web user and the Web server is not protected...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|