Checking for Drive Media

Screen-shot

This program checks the removal and CD-ROM drives for Diskettes, you can either specify a drive or let the program checks all drives on the computer.

The idea of checking disk existance depends on changing the current path to the path of the drive, if an error occurred (with the code 75), that means the computer isn't able to change the path. Consequently, there is no disk in the drive.

The project consists of:
  1. A module where all the functions , declarations and constants are found
  2. A form to demonstrate how to use the module.

The programs input is either the letter of the drive you want to check or just let the program check all drives.

The output is a msgbox specifing whether there is a disk in the drive or not. The program checks the removal or CD-ROM drives only.

The attached zip file contains all neccessary files, the ScreenShot file is a screen shot of the program in case you need it.

Download zipped Project file (3k)



Comments

  • Help From You

    Posted by Legacy on 05/10/2001 12:00am

    Originally posted by: Asif

    I want to have security to my priject
    for the purpuse of external security i want Key Disk
    I am unable to locate code for that your website is not working properly so please send the code through e-mail if possible do me this faver. i will be grateful to you

    Thank you

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute …

  • Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date