Solved

Word App, ActiveX

Posted on 2001-08-22
5
237 Views
Last Modified: 2010-04-06
hello
I wabt to use the WordApplication ActiveX supplied with the DELPHI5.

where/how can i find documanation on this ActiveX?

thanx
tomer

0
Comment
Question by:tomer_engel
5 Comments
 
LVL 27

Expert Comment

by:kretzschmar
ID: 6412801
i would guess at microsoft ;-)
0
 
LVL 11

Expert Comment

by:robert_marquardt
ID: 6412822
The COM objects of Word are described in the VBA help of Word.
It is on the Office Pro CDs, but is not installed by default. When installed open the macro editor of Word from there F1 will take you to the help.
0
 
LVL 17

Expert Comment

by:inthe
ID: 6413933
0
 
LVL 4

Expert Comment

by:jsweby
ID: 6414109
The Server components in Delphi 5 are not ActiveX, they are COM server components which enable your application to communicate with Word or any other of the server applications listed.

J.
0
 
LVL 4

Accepted Solution

by:
jsweby earned 50 total points
ID: 6414130
Essentially, as robert_marquardt said, the documentation for the COM object model of Word is available with Word, you might have to install VBA help from the Word/Office CD first though. Once you have this help file, it lists, like the Delphi help, all of the objects, properties and methods available to you, such as opening and saving documents, finding and replacing text, spell checking, mail merging - all of this can be done through COM. In fact, MS have done such a good job on it (for a change, eh?) that if you can do it in Word, you can do it from your application in Word.

For an excellent document on this, go to:

http://www.delphiinformant.com/features/2000/09/di200009rg_f/di200009rg_f.asp

Delphi Informant is probably the best Delphi magazine available, you might have to subscribe in order to read this article as they have recently locked some article from non-subscribed readers. It's well worth the effort.

J.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Convert Jpg /PNG To GIF 5 118
Newbie Thread Programming 1 139
Delphi application Soap connection 5 96
Run video youtube webbrowse 10 57
Hello everybody This Article will show you how to validate number with TEdit control, What's the TEdit control? TEdit is a standard Windows edit control on a form, it allows to user to write, read and copy/paste single line of text. Usua…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now