Solved

Control String

Posted on 2004-04-08
3
147 Views
Last Modified: 2010-04-05
Why do we need to use Control String?
When do we normally use it?
0
Comment
Question by:cybermilky
3 Comments
 
LVL 11

Expert Comment

by:shaneholmes
ID: 10789148
Control String?

Shane
0
 
LVL 1

Author Comment

by:cybermilky
ID: 10789300
I came across a statement as below:
The control string #89#111#117 is equivalent to the quoted string 'You'
0
 

Accepted Solution

by:
coracleit earned 20 total points
ID: 10789830
Hi,

This 'Control String' as you have called it, enables you to put characters into a string that are not typable from the keyboard.
Eg.

MessageDlg('This is a dialog box' + #10+ 'That spans over 2 lines',mtInformation,[mbOK],0);

This dialog box now has a linefeed control char in the middle and forces the info onto 2 lines.
It could also be #13 which is carrage Return.

Wayne
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now