|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Validates the current transaction:
the modifications performed on the data file since the start of transaction (HTransactionStart) are validated.
the transaction file is deleted (if the transaction is the last transaction in progress for a network application)
the records locked in read-only by the transaction are unlocked.... |
|
|
|
|
|
|
|
| This help page explains how to add a row to a Table control programmatically.... |
|
|
|
|
|
|
|
| For each network application listed in the User Control Center, the "Management of network applications" section is used to...... |
|
|
|
|
|
|
|
| To associate a CDM (Conceptual Data Model) with a project, you must generate the associated LDM (Logical Data Model)...... |
|
|
|
|
|
|
|
| The use of SQL functions to handle Progress data does not require importing the file structure into the analysis...... |
|
|
|
|
|
|
|
| The ScreenCastAllowed property is used to:
find out whether the user can cast the content displayed in the Multimedia control to an external device (compatible with AirPlay),
allow or prevent the user from casting the content displayed in the Multimedia control to an external device (compatible with AirPlay).... |
|
|
|
|
|
|
|
| Validates the current transaction:
the modifications performed on the data file since the start of transaction (HTransactionStart) are validated.
the transaction file is deleted (if the transaction is the last transaction in progress for a network application)
the records locked in read-only by the transaction are unlocked.... |
|
|
|
|
|
|
|
| Several properties can be used with the breaks found in a Looper control...... |
|
|
|
|
|
|
|
| Adding a SaaS site is used to declare a SaaS site deployed on a WEBDEV Application Server to a SaaS web service in order to allow it to be used...... |
|
|
|
|
|
|
|
| Discover the main operations that can be performed on a project.... |
|
|
|
|
|
|
|
| In mobile applications, two-factor authentication is a common method used to verify a user's identity...... |
|
|
|
|
|
|
|
| Creating the executable in practice... |
|
|
|
|
|
|
|
| A composite key is a key item containing several other items...... |
|
|
|
|
|
|
|
| Configuring a replication requires several steps...... |
|
|
|
|
|
|
|
| The automatic data file modification updates the description of data files on user computers...... |
|
|
|
|
|
|
|
| The automatic index generation suggests index keywords based on the content of your help page...... |
|
|
|
|
|
|
|
| The HTML Editor control allows users to create and modify HTML pages...... |
|
|
|
|
|
|
|
| Performing a search in the current project is a common operation...... |
|
|
|
|
|
|
|
| To increase security against worms and viruses, Windows Vista/7 implemented the UAC (User Account Control) mechanism.... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|