Solved

cannot load language driver

Posted on 1998-10-02
6
676 Views
Last Modified: 2011-10-03
" cannot load language driver" error message appears when a user trys to enter into Quattro Pro v. 6.0 network installation on a NetWare v. 4.11 Network Operating System.  They are able to enter into other WordPerfect Suite v. 3.0 applications.
0
Comment
Question by:LuhanS
  • 4
6 Comments
 
LVL 12

Expert Comment

by:mark2150
ID: 1011126
When do you get this message?
0
 

Author Comment

by:LuhanS
ID: 1011128
Edited text of question
0
 
LVL 1

Expert Comment

by:sKiiKe
ID: 1011129
Network path is not in SET PATH statement?
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 1

Accepted Solution

by:
sKiiKe earned 50 total points
ID: 1011130
Check that Borland Database Engine (IDBC ?) is installed in machine that is trying to use Quattro Pro. Error message reminds that of an earlier version's.
0
 
LVL 1

Expert Comment

by:sKiiKe
ID: 1011131
Sorry OS/2-machine here with no Quattro, I guess is name is not IDBC but IDAPI
0
 
LVL 1

Expert Comment

by:sKiiKe
ID: 1011132
Sorry OS/2-machine here with no Quattro, I guess it's name is not IDBC but IDAPI
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question