Solved

Kellyjj and Shivers!!  Need more help!  More pts.!!

Posted on 1998-06-10
3
199 Views
Last Modified: 2010-04-16
Kellyjj and Shivers,

I hope this new question would get your attention, i thank you for all your help, but could you please go read my other question's comments...

If you could describe your process simpler for me...or give me some code snippet it would help.  I have mine in a comment, you could tell me what's wrong.  If one of you give me a code snippet that works, you can have 50 more points (that bankrupts me)

THANKS A MILLION
0
Comment
Question by:hansell
  • 2
3 Comments
 
LVL 2

Accepted Solution

by:
kellyjj earned 50 total points
ID: 1217108
Ok,  I think I see your problem.  In your code snip you gave us,

if [$b800:0000] then ......


you have to actually compare it against something.  [$b800:0000] is not a boolean type.   It actually is of type byte.    

so here a way to do it

if [$b800:0000] ='C' then char_there=TRUE;

if char_there then  writeln("I found a Char");

I hope this makes more sense.
0
 

Author Comment

by:hansell
ID: 1217109
Thanks!  

With your help and the help of newsgroups  (something new to me) I was able to get this done!  What you explained above makes sense, and kinda made me feel stupid...oh well, at least now I know.  

Thanks SOOO much for your help!  
0
 
LVL 2

Expert Comment

by:kellyjj
ID: 1217110
Don't worry about it.  Programming can make any one feel dumb.  I still do things that make me feel REAL dumb. hehe  ;]
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Google always has something new and amazing up its sleeve, and the most current thing that they have been working on is another step in the evolution of Google Search, from machine learning to its brilliant successor, deep learning.
Adding Computers to AD groups through an SCCM Task Sequence
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question