|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Remarks and specific features of Native Informix Connector... |
|
|
|
|
|
|
|
| All the text form the translation file can be reintegrated into a project...... |
|
|
|
|
|
|
|
| List of constants used by properties associated with windows, reports, pages and controls.... |
|
|
|
|
|
|
|
| WDTrans is a tool for canceling transactions...... |
|
|
|
|
|
|
|
| Bloque entièrement ou partiellement un fichier externe.... |
|
|
|
|
|
|
|
| WINDEV, WEBDEV and WINDEV Mobile allow you to use...... |
|
|
|
|
|
|
|
| To increase security against worms and viruses, Windows Vista/7 implemented the UAC (User Account Control) mechanism.... |
|
|
|
|
|
|
|
| A bubble chart shows the correlation between three variables via bubbles of different sizes: categories and values on the X and Y axes and an additional parameter. The size of the bubble indicates the value of this third parameter. |
|
|
|
|
|
|
|
| The Area chart is used to highlight the amplitude of a change...... |
|
|
|
|
|
|
|
| An external component is a set of WINDEV, WEBDEV or WINDEV Mobile elements...... |
|
|
|
|
|
|
|
| The User Macro-Codes are sections of WLanguage code allowing the end user to customize his application...... |
|
|
|
|
|
|
|
| The POP3 and SMTP protocols are protocols for email management recognized by all Internet Service Providers...... |
|
|
|
|
|
|
|
| A scatter chart (XY) represents the relationship between two numeric values in two series of data...... |
|
|
|
|
|
|
|
| Extracts a resource from the application into a physical device location. |
|
|
|
|
|
|
|
| The setup program creation wizard allows you to select the deployment profile to use...... |
|
|
|
|
|
|
|
| SaaS (acronym of Software as a Service) is a model for software distribution that consists in proposing an application in subscription via a Web site rather than via the purchase of a license...... |
|
|
|
|
|
|
|
| The Time type is used to easily handle the times... |
|
|
|
|
|
|
|
| Gets, modifies or restores the data binding to a control or group of controls. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|