|
|
|
|
|
|
|
Raise a number to a power. |
|
|
|
|
|
|
The following files are automatically created when logging an HFSQL Client/Server data file...... |
|
|
|
|
|
|
Deletes the selected rows from a Table or Treeview Table control. |
|
|
|
|
|
|
Used to check whether a lock error occurred. |
|
|
|
|
|
|
Modifies the status of an event. |
|
|
|
|
|
|
Initializes the query linked to the report (for a query with parameters). |
|
|
|
|
|
|
Displays a custom message in a system information window. |
|
|
|
|
|
|
The TitleBackgroundColor property is used to get and change the background color of a column title in a Table or TreeView Table control. |
|
|
|
|
|
|
Gets the current theme of a mobile application. |
|
|
|
|
|
|
Returns the number of words in a string. |
|
|
|
|
|
|
Provokes:
an assertion during the test of element or project (Go mode).
an error in automated test mode.... |
|
|
|
|
|
|
Adds an additional HTTP header to a request of a REST Webservice. |
|
|
|
|
|
|
Defines and enables a "Contains" filter on a data file, view or query. |
|
|
|
|
|
|
Calculates the Cyclical Redundancy Check (CRC) of buffer. |
|
|
|
|
|
|
Opens the project library that is stored on disk. |
|
|
|
|
|
|
The StoreTheValue property is used to:
Find out whether a control keeps its value between two application starts via the persistence.
Modify a control so that it keeps (or not) its value between two application starts via the persistence.... |
|
|
|
|
|
|
Starts a transaction on the data files (HFSQL or accessed via a Native Connector) and creates the transaction file. |
|
|
|
|
|
|
To understand the operating mode of ReplicEdit, we are going to create a replication by using a simple example...... |
|
|
|
|
|
|
List of properties associated with the report blocks... |
|
|
|
|
|
|
The KeyType property is used to set the characteristics of a key item. |
|
|
|
|
|
|
The DefaultValue property is used to:
Find out the default value of an item. This item was defined in the data model editor or through programming.
Define the default value of an item (when describing the item through programming).... |
|
|
|
|
|
|
Deletes a file accessible from the current computer. |
|
|
|
|
|
|
Checks whether a network address can be reached by using the ICMP protocol (similar to the PING network utility). |
|
|
|
|
|
|
Forbids all the modifications on a data file (for all the programs, including the one that requested the no-modification policy). |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|