|
|
|
|
|
|
|
When running an executable, Windows Vista (and later) performs several checks regarding the rights of the current user via the UAC mechanism (User Account Control)... |
|
|
|
|
|
|
This help page presents a list of problems that may occur when using Windows Vista and later... |
|
|
|
|
|
|
To increase security against worms and viruses, Windows Vista/7 implemented the UAC (User Account Control) mechanism. |
|
|
|
|
|
|
Windows Vista (and later) proposes several improvements... |
|
|
|
|
|
|
To increase security against worms and viruses, Windows Vista/7 implemented the UAC (User Account Control) mechanism... |
|
|
|
|
|
|
List of events associated with Button controls... |
|
|
|
|
|
|
By default, WINDEV applications allow end users to modify the interface of the application...... |
|
|
|
|
|
|
A context menu can be opened by the user via a right mouse click...... |
|
|
|
|
|
|
The generation of a WINDEV Mobile application for Android groups all project elements (windows, code, etc.... |
|
|
|
|
|
|
To generate a RAD pattern:... |
|
|
|
|
|
|
The steps for creating a RAD pattern are as follows...... |
|
|
|
|
|
|
A maximized window occupies the entire screen of the mobile device.... |
|
|
|
|
|
|
The steps for creating a RAD pattern are as follows:... |
|
|
|
|
|
|
List of constants used by the functions for managing the windows... |
|
|
|
|
|
|
List of events associated with windows... |
|
|
|
|
|
|
A maximized window occupies the entire screen of the mobile device.... |
|
|
|
|
|
|
The status bar of a window is used to display several types of information...... |
|
|
|
|
|
|
List of constants used by the Windows functions.... |
|
|
|
|
|
|
Windows gives you the ability to schedule automatic tasks via the manager of scheduled tasks...... |
|
|
|
|
|
|
The operations to perform before calling the Technical Support...... |
|
|
|
|
|
|
WINDEV proposes an MVP RAD that generates the "table" and "form" windows as well as the necessary Presenter and Model classes...... |
|
|
|
|
|
|
The following text can be extracted...... |
|
|
|
|
|
|
A pinned control remains visible even if the user moves the scrollbar of the container to display a non-visible area...... |
|
|
|
|
|
|
The retrieval and assignment processes can be public, private or protected. The access rights of the property correspond to the less restrictive rights of the two processes.... |
|
|
|
|
|
|
Kerberos is an authentication mode based on the use of tickets and secret keys...... |
|
|
|
|
|
|
List of events associated with Static controls... |
|
|
|
|
|
|
Widgets are small applications that can be displayed on the home screen of phones or tablets...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|