Solved

export an array(quickie)

Posted on 2002-03-21
6
141 Views
Last Modified: 2013-12-24
yo-0

<cffile action="READ" file="C:\WINNT\Profiles\duncan\Desktop\BCS_Attend.txt" variable="bsc">

<CFSET bcsarray = ListToArray(bsc)>
<cfoutput>
#bcsarray#<br>
</cfoutput>
<cfoutput>
#bsc.recordcount#

wont export the array- help???
0
Comment
Question by:owlsey
  • 3
  • 3
6 Comments
 
LVL 19

Accepted Solution

by:
cheekycj earned 10 total points
ID: 6886567
try
<cfset bscarray = ListToArray(bsc, "#chr(10)##chr(13)#")>

CJ
0
 

Author Comment

by:owlsey
ID: 6886571
q- in asp OpenAsTextStream- i use dhte vbcrlf to signify the line return- does this work in CF?

thansk CheekY!
0
 

Author Comment

by:owlsey
ID: 6886572
q- in asp OpenAsTextStream- i use dhte vbcrlf to signify the line return- does this work in CF?

thansk CheekY!
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 19

Expert Comment

by:cheekycj
ID: 6886578
chr(10) and chr(13) cover both linefeed and carriage return chars.

CJ
0
 

Author Comment

by:owlsey
ID: 6886631
rock so hard you cannae rock nae harder!
0
 
LVL 19

Expert Comment

by:cheekycj
ID: 6886718
Thanx, glad I could help.

CJ
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In our day to day coding, how many times have we come across a necessity to check whether a URL is a broken link or not? For those of you that answered countless and are using ColdFusion like myself, then this article is for you.  It will show yo…
Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now