Solved

CEdit

Posted on 1997-12-04
4
292 Views
Last Modified: 2013-11-20
MFCer,

How can I create a CEdit object with sunken edge ??????

Andrew
0
Comment
Question by:andrewyu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 15

Accepted Solution

by:
Tommy Hui earned 10 total points
ID: 1311701
You can use

  ModifyStyleEx(0, WS_EX_CLIENTEDGE);

0
 

Author Comment

by:andrewyu
ID: 1311702
I had already tried this, but, I cannot ...... Why ??????

Andrew
0
 
LVL 3

Expert Comment

by:shaig
ID: 1311703
you can also do this through:

1. the resource editor
2. PreCreateWindow
3. Create(         ...the extended flags param  )
0
 

Expert Comment

by:schneewi
ID: 1311704
I think, WS_BORDER and WS_EX_CLIENTEDGEare displayed in the same way. Do you use WS_BORDER?
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction: Dynamic window placements and drawing on a form, simple usage of windows registry as a storage place for information. Continuing from the first article about sudoku.  There we have designed the application and put a lot of user int…
Introduction: The undo support, implementing a stack. Continuing from the eigth article about sudoku.   We need a mechanism to keep track of the digits entered so as to implement an undo mechanism.  This should be a ‘Last In First Out’ collec…
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question