|
|
|
|
|
|
|
Some WLanguage functions are not available in Reports & Queries...... |
|
|
|
|
|
|
Starts a session for receiving and reading emails with the IMAP protocol. |
|
|
|
|
|
|
The InputFormula property is used to:
find out whether the end user can enter or change formulas in a Spreadsheet control.
allow or prevent the end user from entering or changing formulas in a Spreadsheet control.... |
|
|
|
|
|
|
The Secure property is used to configure the security level of data file encryption. |
|
|
|
|
|
|
The "Export" pane in the report viewer allows you to perform the following operations...... |
|
|
|
|
|
|
The database of Control Centers groups various information shared by the different modules found in WINDEV, WEBDEV and WINDEV Mobile...... |
|
|
|
|
|
|
Notifies the application when the device enters or leaves the transmission range of a set of Beacons. |
|
|
|
|
|
|
The main operations that can be performed on a data file from the data model editor are as follows...... |
|
|
|
|
|
|
By default, when generating the setup program, the files to install are compressed in a single archive file ("...... |
|
|
|
|
|
|
The LDAP protocol is increasingly used by the companies...... |
|
|
|
|
|
|
Customizes the management of HFSQL errors. |
|
|
|
|
|
|
Modifies the specified record or the record found in memory in the data file (query or view). |
|
|
|
|
|
|
The WithClosingButton property is used to:
Determine whether all the tabs of a Dynamic Tab control have a Close button.
Show a Close button in all the tabs of a Dynamic Tab control.... |
|
|
|
|
|
|
The LDAP protocol is increasingly used by the companies...... |
|
|
|
|
|
|
By default, only the files found in the "List of setup files" window are installed on the user computers...... |
|
|
|
|
|
|
The VisibleEndUser property is used to:
Find out whether an item is visible or not to the end users. This item was defined in the data model editor or programmatically.
Define whether an item must be visible or not to the end users (item described programmatically only).... |
|
|
|
|
|
|
Associates a drive with a shared network directory. |
|
|
|
|
|
|
The principle of JITc technology (Just In Time Compilation) is straightforward...... |
|
|
|
|
|
|
The main operations that can be performed on an item are as follows...... |
|
|
|
|
|
|
When creating and developing the different elements of a project (window, query, report, project, ...... |
|
|
|
|
|
|
Unlocks the records of a data file:
locked by HLockFile.
individually locked by a locking read function.... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|