|
|
|
|
|
|
|
|
|
|
|
|
|
|
| The two most interesting features of WDAPI are...... |
|
|
|
|
|
|
|
| There are two methods two deploy your applications...... |
|
|
|
|
|
|
|
| This help page explains how to create an SQL query to filter records.... |
|
|
|
|
|
|
|
| The description window of a Pivot Table control is used to configure several elements of the control...... |
|
|
|
|
|
|
|
| Log-based replication can be implemented in the data model editor...... |
|
|
|
|
|
|
|
| A Spin control can be bound to an item in a data file, query, etc.... |
|
|
|
|
|
|
|
| To ensure data security and confidentiality, some actions may be restricted to a group of users...... |
|
|
|
|
|
|
|
| WINDEV Mobile allows you to create control templates.... |
|
|
|
|
|
|
|
| A User account allows the server administrator to...... |
|
|
|
|
|
|
|
| The query editor proposes two methods for creating a query...... |
|
|
|
|
|
|
|
| Server triggers are stored procedures executed by the server before or after a write operation performed on a database file...... |
|
|
|
|
|
|
|
| List of constants used by date management functions... |
|
|
|
|
|
|
|
| The computers are becoming more and more powerful...... |
|
|
|
|
|
|
|
| Lists the client certificates found on the computer to authenticate on a server. |
|
|
|
|
|
|
|
| Modifies the client certificate used by default to identify oneself on a server. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|