|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Opens an xBase index file. |
|
|
|
|
|
|
|
| In single-user mode, opens an xBase table without locking it. |
|
|
|
|
|
|
|
| Opens the xBase table and the "memo" file if it exists. |
|
|
|
|
|
|
|
| Returns or modifies the sequence of text items in the xBase files. |
|
|
|
|
|
|
|
| Initializes a query written in SQL language and declares this query to the HFSQL engine. |
|
|
|
|
|
|
|
| WEBDEV Tutorial - Managing an HFSQL Client/Server database Lesson 2 - Managing a Client/Server database - 20 min... |
|
|
|
|
|
|
|
| A Pivot Table control can be handled through programming...... |
|
|
|
|
|
|
|
| Deletes a worksheet from the Excel document.... |
|
|
|
|
|
|
|
| Deletes a row from a Looper control. |
|
|
|
|
|
|
|
| Modifies the style of a control dynamically. |
|
|
|
|
|
|
|
| The static audit is a feature of the environment that analyzes a project to detect potential issues and suggests improvements...... |
|
|
|
|
|
|
|
| The following constants are used by URI-specific functions:... |
|
|
|
|
|
|
|
| Usage example of the HSubstDir function |
|
|
|
|
|
|
|
| WINDEV, WEBDEV and WINDEV Mobile propose several print methods...... |
|
|
|
|
|
|
|
| Encrypts a character string in binary format or in ASCII format. |
|
|
|
|
|
|
|
| Associates the data directory specified in the analysis with a directory found on disk. |
|
|
|
|
|
|
|
| No matter how dexterous a development team may be, the end user of an application will always want to perform an action that is not intended...... |
|
|
|
|
|
|
|
| To customize the interface of an Organization Chart control, you must use specific internal windows.... |
|
|
|
|
|
|
|
| WEBDEV Tutorial - Website deployment Lesson 2 - Deploying a website via HTTP - 30 min |
|
|
|
|
|
|
|
| Usage example of the zipAddDirectory function |
|
|
|
|
|
|
|
| A cell found in a Table control can contain a set of controls...... |
|
|
|
|
|
|
|
| Used to handle the idle periods of a software (period without processes) to optimize the queries and the browses that will be run thereafter. |
|
|
|
|
|
|
|
| To ensure data security and confidentiality, some actions may be restricted to a group of users...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|