|
|
|
|
|
|
|
PC SOFT proposes to host your test sites...... |
|
|
|
|
|
|
Opens an external file (ANSI or UNICODE) in order to handle it through programming. |
|
|
|
|
|
|
Inserts an element into a List Box, ListView or Combo Box control populated programmatically. |
|
|
|
|
|
|
Adds an element to a List Box, ListView or Combo Box control populated programmatically. |
|
|
|
|
|
|
Like for any application, WINDEV allows you to create a setup program for a Java application...... |
|
|
|
|
|
|
List of constants used by the functions for managing external files.... |
|
|
|
|
|
|
WINDEV is provided with projects that contain components.... |
|
|
|
|
|
|
WEBDEV Tutorial - Managing multiple languages in a website Adapting a website to support multiple languages - 50 min |
|
|
|
|
|
|
A sprint or iteration is a development cycle...... |
|
|
|
|
|
|
Each WINDEV function is associated with a WINDEV DLL...... |
|
|
|
|
|
|
New features in WEBDEV 27 presented in the New Features brochure.... |
|
|
|
|
|
|
Displays a value in a control or assigns a value in a variable. |
|
|
|
|
|
|
Executes an SQL query asynchronously. |
|
|
|
|
|
|
An Image control can correspond to an item found in a data file, in a query, ...... |
|
|
|
|
|
|
WEBDEV Tutorial - Creating a WEBDEV project and its analysis Lesson 1 - Creating a WEBDEV project and its analysis - 5 min |
|
|
|
|
|
|
WINDEV Tutorial - Managing multiple languages Adapting an application to support multiple languages - 20 min |
|
|
|
|
|
|
The different operations available for the report controls are as follows...... |
|
|
|
|
|
|
WINDEV proposes to run the different project tests directly on the corresponding executable...... |
|
|
|
|
|
|
To create an SSL server with SocketCreateSSL, you must use a signed certificate containing a private key...... |
|
|
|
|
|
|
Duplicates the record read in a data file: the record found in memory is added into the data file (query or view). |
|
|
|
|
|
|
To configure the general options of the window editor...... |
|
|
|
|
|
|
Kerberos is an authentication mode based on the use of tickets and secret keys...... |
|
|
|
|
|
|
The main executable options are as follows...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|