Solved

Linked lists

Posted on 2001-06-13
8
151 Views
Last Modified: 2010-05-02
I have some sample code that allows me to save to memory and then dump that memory to a file.
The problem I have is being able to tell this part of the sample code to accept my figures (which comprise of about 4000 figures read from the lpt port)I really would love to know how to capture those streaming figures from the port wrap them in such a way that i could put them in this sample code that i have

          In order for this sample code to simulate a lot of figures it does this
For i = 1 To 4000              
          Set curr.pnext = New Node  
          Set curr = curr.pnext      
          curr.key = i
next i  
I need to replicate this programmatical scenario  with mine
0
Comment
Question by:leachim
  • 4
  • 4
8 Comments
 
LVL 69

Expert Comment

by:Éric Moreau
ID: 6185804
You can implement "Linked list" like features using the Collection object. You don't have to worry about the "Next" pointer. The Collection object is handling it for you.
0
 

Author Comment

by:leachim
ID: 6185859
emoreau
thanks for that
0
 
LVL 69

Expert Comment

by:Éric Moreau
ID: 6186081
If you think that you have all you need, you should accept the comment!
0
 

Author Comment

by:leachim
ID: 6186121
emoreau
i have accepted and graded the comment!
but that  system de experts-exchange has not recorded it poses another question?!
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 69

Accepted Solution

by:
Éric Moreau earned 40 total points
ID: 6186891
Can you accept this one?
0
 

Author Comment

by:leachim
ID: 6186920
emoreau
There is no button to facilitate such an action
0
 

Author Comment

by:leachim
ID: 6186928
Thats done it
hope you got it that time emoreau
0
 
LVL 69

Expert Comment

by:Éric Moreau
ID: 6186967
Thanks.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

If you have ever used Microsoft Word then you know that it has a good spell checker and it may have occurred to you that the ability to check spelling might be a nice piece of functionality to add to certain applications of yours. Well the code that…
Most everyone who has done any programming in VB6 knows that you can do something in code like Debug.Print MyVar and that when the program runs from the IDE, the value of MyVar will be displayed in the Immediate Window. Less well known is Debug.Asse…
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
This lesson covers basic error handling code in Microsoft Excel using VBA. This is the first lesson in a 3-part series that uses code to loop through an Excel spreadsheet in VBA and then fix errors, taking advantage of error handling code. This l…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now