|
|
|
|
|
|
|
List of constants used by the functions for managing Table, TreeView Table, Looper and List Box controls.... |
|
|
|
|
|
|
Reads the email found before the current email according to the protocol used (POP3 or IMAP, MS Exchange, Lotus Notes or Outlook). |
|
|
|
|
|
|
Adds a file to the compilation. |
|
|
|
|
|
|
Closes an email management session depending on the selected mode (SMTP/POP3, IMAP, MS Exchange or Lotus Notes).... |
|
|
|
|
|
|
WINDEV is provided with projects that contain components.... |
|
|
|
|
|
|
List of constants used by the Automatic Application Features (AAF) functions.... |
|
|
|
|
|
|
The code history is used to...... |
|
|
|
|
|
|
Rich Text Format (RTF) is used to encode text and simplify exchange between applications...... |
|
|
|
|
|
|
WINDEV, WINDEV Mobile and WEBDEV allow you to handle a Looper control by programming...... |
|
|
|
|
|
|
The different Control Centers provided with WINDEV allow you to easily manage the user feedback for your applications...... |
|
|
|
|
|
|
From the monitor, you can change the configuration options...... |
|
|
|
|
|
|
The list below presents the error messages that are displayed in the remote setup wizard (for the site manager)...... |
|
|
|
|
|
|
Defines a BitMap file as destination of a chart (BMP means BitMap). |
|
|
|
|
|
|
Retrieves all the emails found on a server. |
|
|
|
|
|
|
The Gesture variable is used to retrieve the gesture parameters (swipe)...... |
|
|
|
|
|
|
This help page presents the actions that can be performed from the description window of a query.... |
|
|
|
|
|
|
Defines the next control that will be in edit in the current window. |
|
|
|
|
|
|
Retrieves the text or image found in the system clipboard. |
|
|
|
|
|
|
The download is the operation that consists in saving a file stored on the server onto the computer of Web user...... |
|
|
|
|
|
|
The different methods for associating an image with the elements of a TreeView control.... |
|
|
|
|
|
|
Specifies whether the communication functions that use HTTP or HTTPS must go through a proxy to execute their requests. A proxy is used to share the access to Internet between the different network computers. |
|
|
|
|
|
|
Draws a chart according to the specified parameters. |
|
|
|
|
|
|
To create a strong-named .NET assembly ...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|