Solved

Access a database without BDE?

Posted on 1998-11-10
14
233 Views
Last Modified: 2013-11-23
How to access a database without BDE.

some samples, links, or orientation please.
0
Comment
Question by:lortega
  • 7
  • 5
  • 2
14 Comments
 
LVL 4

Expert Comment

by:dwwang
ID: 1346414
It totally depends on what kind of database you want to open, Interbase/MSSQL/Paradox/...?
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1346415
if it is for a specific database, then we need more info.
if it is for a small program, collecting little data, use free QDB :

http://home.sprynet.com/sprynet/rrm/qdb.html

Regards, Zif.
0
 
LVL 2

Author Comment

by:lortega
ID: 1346416
Is a good product but is not to acces db files (Paradox files)
0
 
LVL 2

Author Comment

by:lortega
ID: 1346417
zzz ZZZ zzz ZZZ zzz
0
 
LVL 2

Author Comment

by:lortega
ID: 1346418
ZZZzzzZZZzzzZZZzzzZZZ
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1346419
sorry don't know how to connect to paradox without bde... don't know any components too.... sorry.
0
 
LVL 4

Expert Comment

by:dwwang
ID: 1346420
Since Paradox is private product of Inprise, there's no free software for accessing it with out BDE.

For commercial softwares, you can visit Intersolve's website.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 2

Author Comment

by:lortega
ID: 1346421
dbase can be accepted...
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1346422
yes for dbase it can.
0
 
LVL 2

Author Comment

by:lortega
ID: 1346423
ZZZzzzZZZzzzZZZZzzZZZzzz
0
 
LVL 8

Expert Comment

by:ZifNab
ID: 1346424
? ZZZzzz...

What do you mean with dbase can be accepted?
0
 
LVL 2

Author Comment

by:lortega
ID: 1346425
Control that access dbase tables
0
 
LVL 8

Accepted Solution

by:
ZifNab earned 50 total points
ID: 1346426
0
 
LVL 2

Author Comment

by:lortega
ID: 1346427
Goods!

thanks ZifNab
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now