Solved

VB & AI

Posted on 2002-05-08
10
178 Views
Last Modified: 2012-05-04
Looking for a code in VB that works like a grammer checker.
0
Comment
Question by:raidt
  • 5
  • 3
  • 2
10 Comments
 
LVL 3

Expert Comment

by:n_narayanan
ID: 6997998
0
 
LVL 3

Expert Comment

by:n_narayanan
ID: 6998002
0
 
LVL 3

Expert Comment

by:n_narayanan
ID: 6998003
0
 
LVL 3

Expert Comment

by:n_narayanan
ID: 6998010
I am appending another code which uses Word

Public Function SpellCheck(ByVal IncorrectText$) As String

Dim Word As Object, retText$

On Error Resume Next

Set Word = CreateObject("Word.Basic")

Word.AppShow
Word.FileNew
Word.Insert IncorrectText
Word.ToolsSpelling
Word.EditSelectAll

retText = Word.Selection$()
SpellCheck = Left$(retText, Len(retText) - 1)
Word.FileClose 2

Show

Set Word = Nothing

End Function
Private Sub cmdSpellCheck_Click()
Text1 = SpellCheck(Text1)
End Sub

0
 
LVL 3

Expert Comment

by:n_narayanan
ID: 6998011
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 

Author Comment

by:raidt
ID: 6998421
Well What i am looking for is an algorithem to check for grammer i dont want to use words component.
0
 
LVL 1

Expert Comment

by:raid999
ID: 6998434
I have done something like that would you be interested in the code.

__________________________
is Raid your name?
0
 

Author Comment

by:raidt
ID: 6998589
Yes sure can i have a look at the code. and yes my name is Raid.
0
 
LVL 1

Accepted Solution

by:
raid999 earned 500 total points
ID: 7001395
Please go to my ftp server ftp://80.195.36.75./raid
and in that folder there is another one called BSC and inside that folder you can find the source code and the exe file called grammer.

_____________________
Cheers
0
 

Author Comment

by:raidt
ID: 7003593
That was perfect. thanx man. bye the way nice name :)
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Most everyone who has done any programming in VB6 knows that you can do something in code like Debug.Print MyVar and that when the program runs from the IDE, the value of MyVar will be displayed in the Immediate Window. Less well known is Debug.Asse…
When designing a form there are several BorderStyles to choose from, all of which can be classified as either 'Fixed' or 'Sizable' and I'd guess that 'Fixed Single' or one of the other fixed types is the most popular choice. I assume it's the most p…
Get people started with the process of using Access VBA to control Excel using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Excel. Using automation, an Access application can laun…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now