Solved

waveOutSetVolume

Posted on 1997-04-06
1
340 Views
Last Modified: 2010-04-06
I dont know what to write if i just want to play a wavefile ex. file.wav and automatically change the soundvolume from minimum to maximum.
I know how to play the file in MediaPlayer but it is the soundvolume i cant figure out.

I have found this function:
waveOutSetVolume(uDeviceID: Word; dwVolume: Longint): Word;

Please write excatly what i have to do:)

regards Jakob Adeltoft
0
Comment
Question by:Jakob Adeltoft
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 2

Accepted Solution

by:
javiertb earned 50 total points
ID: 1335215
Try This:
        WORD wLeft = 0x0000, wRight = 0xFFFF;
        waveOutSetVolume(0, (DWORD)MAKELONG(wLeft, wRight));

It will set the left speaker volume to 0, and the right to Full.


0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The uses clause is one of those things that just tends to grow and grow. Most of the time this is in the main form, as it's from this form that all others are called. If you have a big application (including many forms), the uses clause in the in…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month8 days, 21 hours left to enroll

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question