Solved

Add-in packages

Posted on 2000-03-13
4
145 Views
Last Modified: 2010-04-04
I want to implement an application framework consisting of a baseform, an inherited child(c1) and an form c1 inherited child2(c2). All three reside in a different .bpl; Now i add a new class at c1 level and want c2 to inherited from it (run-time). Problem is that design time it compiles well but run-time i'm loaded with access violations etc. Could anyone give me an idea ?
0
Comment
Question by:MarlonR
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 12

Expert Comment

by:rwilson032697
ID: 2613972
Can you show some code snippets where the violations occur?

Cheers,

Raymond.
0
 
LVL 12

Expert Comment

by:rwilson032697
ID: 2613979
0
 
LVL 1

Expert Comment

by:yk030299
ID: 2614561
listen
0
 

Accepted Solution

by:
dbuch earned 200 total points
ID: 2794877
Hi

I have implemented exactly what you are looking for successfully.

If you tell me a bit more about what violations are occuring we can see where it is happening. Ideally send me your code and I will look at it.

Cheers

David
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question