|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Returns the information retrieved by DDERetrieve. |
|
|
|
|
|
|
|
| The "Connections" tab gives various information about the current connections...... |
|
|
|
|
|
|
|
| The 64-bit operating systems are starting to appear on the PCs and on the servers...... |
|
|
|
|
|
|
|
| We are going to call the elements developed in WINDEV (project, windows, analysis, ...... |
|
|
|
|
|
|
|
| A Sliding Banner control can be handled through programming...... |
|
|
|
|
|
|
|
| WINDEV, WEBDEV and WINDEV Mobile allow you to programmatically manipulate Map controls.... |
|
|
|
|
|
|
|
| The analysis proposes two types of Unicode items...... |
|
|
|
|
|
|
|
| Git is a source code manager...... |
|
|
|
|
|
|
|
| Enables or disables the full-screen mode in the applications in Universal Windows 10 App mode. |
|
|
|
|
|
|
|
| A report based on an Organizer control is used to directly print the information displayed in the Organizer control... |
|
|
|
|
|
|
|
| A report based on a variable is used to directly print the information found in a WLanguage variable...... |
|
|
|
|
|
|
|
| Do you know where to find your application log files?... |
|
|
|
|
|
|
|
| Action Bars replace the title bar of a window and display different types of information...... |
|
|
|
|
|
|
|
| The data that will be displayed in the Chart control can come from...... |
|
|
|
|
|
|
|
| WINDEV and WEBDEV allow you to handle an HTML control through programming...... |
|
|
|
|
|
|
|
| This help page explains how to create and run an SQL query through programming.... |
|
|
|
|
|
|
|
| The project dashboard is an essential element for managing WINDEV Mobile projects.... |
|
|
|
|
|
|
|
| A List Box control can be bound to an item in a data file, query, etc.... |
|
|
|
|
|
|
|
| WINDEV, WINDEV Mobile and WEBDEV allow you to programmatically manipulate Combo Box controls...... |
|
|
|
|
|
|
|
| The Repositionable Note control allows you to include the famous yellow sticker in your applications...... |
|
|
|
|
|
|
|
| "Password" items are used to securely store passwords by using a salt and a hash algorithm...... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|