Solved

Ok, I am Stuck and Lost.

Posted on 2003-12-07
4
256 Views
Last Modified: 2010-04-17
Ok, I am just going to upload my whole project here.
*After you take a look at the project the following will make some sence I think. o_0

First Step "Login".
Second Step Hit "Step 1".
Third Step Hit "Step 2".
Last Step Hit "Step 3".

Ok, At Step 2 I am checking for any Matches of LstResults with LstBuy.
If there is a match then I want to use the match and its lstItemData that is associated with the lstResults.
I don't know how to do this. Right now when I go to step 3 it just uses the last String in lstItemData. Any Help would be appreciated. If no one understands me Please Tell me what you Don't Understand!

I Guess I will have to upload the compressed file to a website.  http://www.geocities.com/stret_squirrel/Neopets.Zip


*Btw its geocities so you have to copy and paste the url.
0
Comment
Question by:MysticalNeopian
  • 2
  • 2
4 Comments
 
LVL 9

Expert Comment

by:bhagyesht
ID: 9894796
The link doesnt work. and would appreciate if you let us know what language is your development in?
0
 

Author Comment

by:MysticalNeopian
ID: 9894910
The link does work you just have to copy and paste it. VB 6.
0
 

Author Comment

by:MysticalNeopian
ID: 9894915
ah my bad had to change "Zip" to "zip"
but you still have to copy and paste it.
http://www.geocities.com/stret_squirrel/Neopets.zip
0
 
LVL 9

Accepted Solution

by:
bhagyesht earned 95 total points
ID: 9894981
the reason i suppose is in sub CheckShop
in your loop you are not exiting and are executing it for all the elements. quit when your match is found.

one more thing
add the following api
Private Declare Sub Sleep Lib "kernel32" (ByVal dwMilliseconds As Long)

and in the
Private Sub cmdShop_Click()

add the following lines
While Inet.StillExecuting
    DoEvents
    Sleep (200)
Wend

this will prevent the error if the user click while the inet contol is still executing
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

RIA (Rich Internet Application) tools are interactive internet applications which have many of the characteristics of desktop applications. The RIA tools typically deliver output either by the way of a site-specific browser or via browser plug-in. T…
If you’re thinking to yourself “That description sounds a lot like two people doing the work that one could accomplish,” you’re not alone.
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now