Formatting Strings


This function allows the user to left, right, or center text within a specified length.

EG.

format "Hello" right justified within a length of 10 characters.

" Hello"

option Explicit

Const LJ = 0
Const RJ = 1
Const CJ = 2

Function FormatLen(StringtoFormat as Variant, _
                   LengthtoFormat as Variant, _
                   optional Justify as Variant) as string

    Dim Temp as string
    
    If IsNumeric(LengthtoFormat) = true And IsNumeric(Justify) = _
                                   true then
        If len(StringtoFormat) >= LengthtoFormat then
            FormatLen = Left$(StringtoFormat, LengthtoFormat)
        else
            If IsMissing(Justify) Or Justify = LJ then
                Temp = StringtoFormat & Space(LengthtoFormat - _
                       len(StringtoFormat))
                FormatLen = Temp
            ElseIf Justify = RJ then
                Temp = Space(LengthtoFormat - len(StringtoFormat)) & _
                       StringtoFormat
                FormatLen = Temp
            ElseIf Justify = CJ then
                 Temp = Space((LengthtoFormat \ 2) - (len(StringtoFormat) _
                        \ 2))
                 Temp = Temp & StringtoFormat
                 Temp = Temp & Space(LengthtoFormat - len(Temp))
                 FormatLen = Temp
            else
                MsgBox "Could not format string!", vbOKOnly
            End If
        End If
    else
        MsgBox "Could not format string!", vbOKOnly
    End If

End Function

Download Format.bas (2k)



Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • This paper introduces IBM Java on the IBM PowerLinux 7R2 server and describes IBM's implementation of the Java platform, which includes IBM's Java Virtual Machine and development toolkit.

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds