|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Returns the rounded value of a numeric value according to the specified number of decimal places. |
|
|
|
|
|
|
|
| WINDEV allows you to create native 64-bit Linux executables. Their UI is developed with the window editor.... |
|
|
|
|
|
|
|
| It is now common for individuals or businesses to sign contracts electronically...... |
|
|
|
|
|
|
|
| List of constants used by string management functions... |
|
|
|
|
|
|
|
| Seeks one or more emails according to specified criteria, in a local or remote Lotus Notes or Domino database. |
|
|
|
|
|
|
|
| Copies an email found in a directory to another directory of an IMAP server. |
|
|
|
|
|
|
|
| Modifies the parameters of a scheduled task. |
|
|
|
|
|
|
|
| Copies an image to another image. |
|
|
|
|
|
|
|
| The HFSQL Control Center is used to manage the backups of HFSQL Client/Server data files...... |
|
|
|
|
|
|
|
| The following constants are used to manage Beacons: |
|
|
|
|
|
|
|
| The code editor is the editor where the developers spend most of their time. This help page presents a series of useful options for the most common actions ...... |
|
|
|
|
|
|
|
| MyInternalWindow is used to handle the current internal window. |
|
|
|
|
|
|
|
| Several actions are automatically performed when opening or closing an application.... |
|
|
|
|
|
|
|
| The management of the incoming calls is performed in a specific "thread".... |
|
|
|
|
|
|
|
| Sets the position on the last record of a table according to a browse item. |
|
|
|
|
|
|
|
| Sets the position on the first record of a table according to the specified browse item. |
|
|
|
|
|
|
|
| Run on the server, this function is used to wait for a connection request coming from the client sockets. |
|
|
|
|
|
|
|
| The Switch control is a 2-state Check Box control (on/off, true/false, yes/no)...... |
|
|
|
|
|
|
|
| Set focus:
to a control (found in a window, in a page or in a frameset).
to a window.... |
|
|
|
|
|
|
|
| In an analysis, the "Key" items are also used to manage the consistency of data (called referential integrity)...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|