Flylib.com
List of Figures
Previous page
Table of content
Next page
Team-Fly
Chapter 2: Introduction to ADO
Figure 2-1: ADO connecting to OLE DB
Figure 2-2: OLE DB Providers as exposed by the Data Link Properties dialog box
Figure 2-3: The ADO 2.5 Object Model
Chapter 3: Creating ADO Objects
Figure 3-1: The Visual Basic IDE Project/References dialog box
Chapter 4: Getting Connected
Figure 4-1: OLE DB Providers
Figure 4-2: Using the Data Link Properties dialog box to build a Connection String
Figure 4-3: The ADODC Property Page after the ConnectionString is built
Figure 4-4: Use the SQL Server 7.0 Client Network Utility to select an alternative protocol.
Figure 4-5: Be sure to set the prompting level to avoid exposing this dialog box.
Figure 4-6: The Visual Basic 6.0 Data View window
Figure 4-7: The Data Environment Designer exposing a stored procedure dragged from the Data View window.
Figure 4-8: Using the Data View window to create a new Data Link
Figure 4-9: Using the ODBC Data Source Administrator to select connection pooling options.
Figure 4-10: Using the SQL Server Profiler to trace TSQL querie
Chapter 5: ADO Command Strategies
Figure 5-1: Direction property enumerated constants
Figure 5-2: The VB IDE prompting with a list of ADO datatypes
Chapter 6: Recordset Strategies
Figure 6-1: VDT Query Designer
Chapter 7: Manipulating Your Recordset
Figure 7-1: Set the MSHFlexGrid1.Recordset to your Recordset to display the rowset.
Figure 7-2: Use Debug.Print to display the Recordset field names and values in the Immediate window.
Figure 7-3: The Visual Basic IDE exposes the Recordset Events.
Figure 7-4: Examining the Locals Window GetRows Variant Array
Figure 7-5: The Sort, Filter, and Find example user interface
Figure 7-6: Handling multiple result sets returned from stored procedures
Figure 7-7: Right-click the Object Browser and select "Show hidden members" to see deprecated objects such as Recordset21.
Chapter 8: Passing Resultsets Between Layers
Figure 8-1: Presenting the rows on the client
Chapter 9: Web-based Solutions
Figure 9-1: Capturing parameters from a Web page and invoking an ASP
Figure 9-2: Returning XML from an ASP via URL reference to pass a Recordset
Chapter 10: Getting Your Data into Shape
Figure 10-1: Hierarchy constructed by Data Environment Designer
Figure 10-2: Author "parent" rows and associated TitleAuthor "child" rows
Figure 10-3: Using bound TextBox controls with the MSHFlexGrid
Figure 10-4: An MSHFlexGrid populated from a Data Environment Designer-generated query
Figure 10-5: The Data Environment Designer Connection (Visual Basic) property page
Chapter 11: Data Access Tips and Techniques
Figure 11-1: Using SQL Enterprise Manager to add a new remote server
Chapter 12: ADO and the Visual Database Tools
Figure 12-1: Visual Basic 6.0 Data View Window-adding a new Data Link
Figure 12-2: Visual Basic 6.0 Data View window-a typical database diagram
Figure 12-3: The Visual Basic 6.0 Data Environment Designer with Four Commands
Figure 12-4: The Data Environment Designer's query editor
Figure 12-5: The Data Environment Designer Property page where you set prompt behavior
Team-Fly
Previous page
Table of content
Next page
Ado Examples and Best Practices
ISBN: 189311516X
EAN: 2147483647
Year: 2000
Pages: 106
Authors:
William R. Vaughn
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Object Description in Cryptography Using ASN.1
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
The .NET Developers Guide to Directory Services Programming
Choosing an Object Class
Search Flags and Indexing
Directory Object Permissions in Active Directory and ADAM
Summary
Expanding Group Membership
A Practitioners Guide to Software Test Design
Section I - Black Box Testing Techniques
Equivalence Class Testing
Boundary Value Testing
Control Flow Testing
Section IV - Supporting Technologies
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
IP Routing Topics
Distance-Vector and Link-State Routing Protocols
An Advanced BGP Configuration
BGP TTL Security
Configuring a Simple DDR Connection
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Unauthorized Activity II
Tcpdump
IDS and IPS Internals
NFR Security
Special Edition Using FileMaker 8
FileMaker Extra: Creating a Script Library
Selection Portals
Exporting to Fixed-Width Formats
About Custom Web Publishing
Citrix/Terminal Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies