Implementing Checkbox Controls with a TreeView

This little sample program demonstrates how to make a treecontrol with checkboxes belonging to each item. Note that this sample was generated using MSVC++ 5. Should work with MSVC++ 6 as well.

Note further that I used the style-constant TVS_CHECKBOXES, which is declarated in VC++5, but not commented.

Downloads

Download demo project - 23 Kb


Comments

  • Tree Control

    Posted by Legacy on 01/08/2003 12:00am

    Originally posted by: Pratibha Chilamkurti

    Can anyone let me know how to disable the items (tree nodes) in a tree control (with check boxes). Its very urgent requirement for me..
    
    

    regards
    Pratibha

    Reply
  • ExTree

    Posted by Legacy on 10/18/2001 12:00am

    Originally posted by: Mike Philis

    Are you looking for a cool tree control?
    
    

    Check this out: http://www.exontrol.com/sg.jsp?content=products/extree

    Features include:
    ActiveX hosting, events from contained components are fired through to your program using the exact same model used in VB6 for components added at run time, data bounding, multiple columns, and more

    Mike
    www.exontrol.com

    Reply
  • treecontrol

    Posted by Legacy on 04/25/2000 12:00am

    Originally posted by: Mikl Shlensky

    This program works well. But I don't know, how set third empty state of checkbox.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date