Solved

Ok, I am Stuck and Lost.

Posted on 2003-12-07
4
252 Views
Last Modified: 2010-04-17
Ok, I am just going to upload my whole project here.
*After you take a look at the project the following will make some sence I think. o_0

First Step "Login".
Second Step Hit "Step 1".
Third Step Hit "Step 2".
Last Step Hit "Step 3".

Ok, At Step 2 I am checking for any Matches of LstResults with LstBuy.
If there is a match then I want to use the match and its lstItemData that is associated with the lstResults.
I don't know how to do this. Right now when I go to step 3 it just uses the last String in lstItemData. Any Help would be appreciated. If no one understands me Please Tell me what you Don't Understand!

I Guess I will have to upload the compressed file to a website.  http://www.geocities.com/stret_squirrel/Neopets.Zip


*Btw its geocities so you have to copy and paste the url.
0
Comment
Question by:MysticalNeopian
  • 2
  • 2
4 Comments
 
LVL 9

Expert Comment

by:bhagyesht
Comment Utility
The link doesnt work. and would appreciate if you let us know what language is your development in?
0
 

Author Comment

by:MysticalNeopian
Comment Utility
The link does work you just have to copy and paste it. VB 6.
0
 

Author Comment

by:MysticalNeopian
Comment Utility
ah my bad had to change "Zip" to "zip"
but you still have to copy and paste it.
http://www.geocities.com/stret_squirrel/Neopets.zip
0
 
LVL 9

Accepted Solution

by:
bhagyesht earned 95 total points
Comment Utility
the reason i suppose is in sub CheckShop
in your loop you are not exiting and are executing it for all the elements. quit when your match is found.

one more thing
add the following api
Private Declare Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As Long)

and in the
Private Sub cmdShop_Click()

add the following lines
While Inet.StillExecuting
    DoEvents
    Sleep (200)
Wend

this will prevent the error if the user click while the inet contol is still executing
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

RIA (Rich Internet Application) tools are interactive internet applications which have many of the characteristics of desktop applications. The RIA tools typically deliver output either by the way of a site-specific browser or via browser plug-in. T…
This is an explanation of a simple data model to help parse a JSON feed
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now