Database Sample (Repeater Frequency Index)

This program is a database intensive application, which demonstrates the following topics regarding the manipulation of a Microsoft JET database using the MFC DAO database classes:
  1. Reading a JET database
  2. Sorting a recordset
  3. Filtering a recordset
  4. Searching a recordset
  5. Adding records
  6. Deleting records
  7. Editing/Updating records
  8. Dynamically building an SQL query

In addition to MFC DAO database access, this app demonstrates tray icon notification, subclassing the standard MFC List Control, and a Splash Screen.

I am releasing this app into the public domain with no restrictions, however, portions of this program are Copyright as described:

Module : CTrayNotifyIcon
Purpose: Interface for a MFC class to encapsulate
Shell_NotifyIcon
Created: PJN / NOTSHELL/1 / 14-05-1997
Copyright (c) 1997 by PJ Naughter.  
All rights reserved.

You may wish to make note of this persons efforts on the page.

This program has not been released previously, however, was intended for release to a specific target audience (HAM radio operators), and will continue to be updated and distributed (as soon as I figure out how to do it) as public domain software.

Download Files The zip file is 55K.



Comments

  • favor

    Posted by Legacy on 03/20/2003 12:00am

    Originally posted by: lex

    can you make a system that an microsoft access database
    

    Reply
  • database access in Platform SDK

    Posted by Legacy on 01/27/2003 12:00am

    Originally posted by: bhagya

    instead of making using of MFC DAo classes, how do we
    achieve the same functionality in Platofrm SDK

    Reply
  • ADO Interface database programming samples needed

    Posted by Legacy on 10/23/2002 12:00am

    Originally posted by: Robert Wane

    Where can I find any examples using ADO interface in visual BASIC 6.0

    Reply
  • Very Good

    Posted by Legacy on 08/21/2000 12:00am

    Originally posted by: Omar Aguiar

    Thank you so much for the code source. Helpful.

    Reply
  • podda chetta

    Posted by Legacy on 11/25/1999 12:00am

    Originally posted by: Chetta

    Padda chetta

    Reply
  • working with secure database

    Posted by Legacy on 09/21/1999 12:00am

    Originally posted by: vinay kamath

    Can anyone give me information about creating and working with secure databases

    Reply
  • Takes My Breath Away!

    Posted by Legacy on 02/24/1999 12:00am

    Originally posted by: Bill Tilton

    Fabulous example! I love it! No hyperbole.

    Reply
  • Excellent

    Posted by Legacy on 01/16/1999 12:00am

    Originally posted by: Houllier julien

    Everything is here: professionnal & usefull!

    Nice !

    Reply
  • Very useful app

    Posted by Legacy on 01/13/1999 12:00am

    Originally posted by: Nevena Glisic

    I found your application very useful for me.
    I use it in one of my Dao based applications.
    Thanks for publishing this app.

    Reply
  • Include ODBC

    Posted by Legacy on 11/20/1998 12:00am

    Originally posted by: Dileep . V

    All examples in the site are Dao based applications . For that you need MS Access. I don't have MS Access but I have DB2 . So I am not able to use any of these examples . So please include more ODBC examples or ODBC versions of these projects if possible.

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • 10 Rules that Make or Break Enterprise App Development Projects In today's app-driven world, application development is a top priority. Even so, 68% of enterprise application delivery projects fail. Designing and building applications that pay for themselves and adapt to future needs is incredibly difficult. Executing one successful project is lucky, but making it a repeatable process and strategic advantage? That's where the money is. With help from our most experienced project leads and software engineers, …

  • Between contractors and employees, there is a great deal of risk surrounding the privacy and security of sensitive data in the healthcare industry. When a breach is suspected, the law requires that healthcare organizations quickly launch an investigation to find the source and scope of the issue. These investigations can be quite costly, to say nothing of the penalties for the breach itself and the damage to reputation and brand. This white paper details new affordable software tools that can help healthcare …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds