Solved

check/Uncheck  tree control in MFC using recursive

Posted on 2001-08-14
8
431 Views
Last Modified: 2013-11-20
i have a tree control with check boxes. i want to check or uncheck the tree control using recursive function.
how can i do this.
Requirements.
1. when i click on check box of an item all its parent should be checked.

2. when i double click on check box of an item all its child nodes has to be checked.

3. if an item has childrens then its single click event should not change the state of its item.

0
Comment
Question by:pratimag
8 Comments
 
LVL 2

Expert Comment

by:SamratAshok
Comment Utility

you will need two separate recursive paths.

1st path : Check/uncheck parent of current element and recurse on parent.

2nd path : Check current element and loop for all its childs. (recurse at each child node)

When item is clicked, you travel on 1st path.

When item is double clicked, You will need to go to both paths and in this case
you have to ensure (via sentinel or thru global var) that items do not overlap

Needless to say, recursion is intuitive to think, but tricky to implement and also
tree control tends to present itself as a linked list, so looped alogirthms may
be more efficient.

0
 

Author Comment

by:pratimag
Comment Utility
i have written a recursive function for this, but it is not working properly. if someone can send a sample code for this i will be greatful to him.

0
 
LVL 2

Expert Comment

by:SamratAshok
Comment Utility
Send in your code and I will tell you what you need to correct.

Are you/your design requirements flexible enough to implement
a non recursive implementation?

0
 

Author Comment

by:pratimag
Comment Utility
Here is the code:

The description for parameters:
hParent - parent node of the item checked(in some cases it might be the grandparent node)

void CTestDialog::CheckParentStatus(HTREEITEM hParent,BOOL &bchkTreeStatus)
{    
     HTREEITEM hChildItem;
     CTreeCtrl* pDbgTree = (CTreeCtrl*)GetDlgItem(IDC_DEBUGGINGTREE);
     if(pDbgTree->ItemHasChildren(hParent))
     {
          hChildItem = pDbgTree->GetChildItem(hParent);
          while (hChildItem != NULL)
          {
               BOOL btemp = pDbgTree->GetCheck(hChildItem);
               if(btemp)
               {
                    if(pDbgTree->ItemHasChildren(hChildItem))
                    {
                              CheckParentStatus(hChildItem,bchkTreeStatus);
                    }
                    else
                    {
                         bchkTreeStatus = TRUE;
                    }
                    break;
               }
               else
               {
                    if(pDbgTree->ItemHasChildren(hChildItem))
                    {
                         CheckParentStatus(hChildItem,bchkTreeStatus);
                    }
                    else
                    {
                         bchkTreeStatus = FALSE;
                    }
               }
               hChildItem = pDbgTree->GetNextItem(hChildItem, TVGN_NEXT);
          }
     } // END of if loop for checking the children
     else
     {
          BOOL btemp = pDbgTree->GetCheck(hParent);
          if(btemp)
          {
               bchkTreeStatus = TRUE;
          }
          else
          {
               bchkTreeStatus = FALSE;
          }
          return;

     }
     
     if(bchkTreeStatus)
     {
          pDbgTree->SetCheck(hParent,TRUE);
          HTREEITEM hpItem;
          hpItem = pDbgTree->GetParentItem(hParent);
          while(hpItem != NULL)
          {
               pDbgTree->SetCheck(hpItem,TRUE);
               hpItem = pDbgTree->GetParentItem(hpItem);
          }
     }
     else
     {
          pDbgTree->SetCheck(hParent,FALSE);
          HTREEITEM hpItem;
          hpItem = pDbgTree->GetParentItem(hParent);
          while(hpItem != NULL)
          {
               pDbgTree->SetCheck(hpItem,FALSE);
               hpItem = pDbgTree->GetParentItem(hpItem);
          }
     }
}
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 2

Expert Comment

by:SamratAshok
Comment Utility
Hi

I read the code,
I tried reproducing the error on my machine, by adding
a dialog box around your code, but could not do much
after that as I got swamped in my own work.

Shouldn't you divide functions that handle parents
and childs into separate functions and call each of them
exactly once.

Due to current design, for every child you will loop
over its parents. This although not infinite loop
is waste of time and complicated logic.

Few questions, what is the second param for? to return
the finally check value or value to set in first place.
You seem to be using same variable for multiple reasons.

if possible, Send me event code where you make this call!
0
 
LVL 23

Expert Comment

by:Roshan Davis
Comment Utility
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

To be deleted and points refunded

Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

Roshan Davis
EE Cleanup Volunteer
0
 
LVL 2

Expert Comment

by:SamratAshok
Comment Utility
I had forgotten about this question. I think she used the solutions implied
and got on with it. I leave it to you to judge whether it is sufficiently
answered. In any case, I would request u to remove question from PAQ
list so that some other poor joe does not end up wasting points to see it.
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
Comment Utility
PAQed, with points refunded (50)

Computer101
E-E Admin
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

Suggested Solutions

Introduction: The undo support, implementing a stack. Continuing from the eigth article about sudoku.   We need a mechanism to keep track of the digits entered so as to implement an undo mechanism.  This should be a ‘Last In First Out’ collec…
Exception Handling is in the core of any application that is able to dignify its name. In this article, I'll guide you through the process of writing a DRY (Don't Repeat Yourself) Exception Handling mechanism, using Aspect Oriented Programming.
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now