Solved

Re: Usage Of Com 1

Posted on 2004-04-27
5
208 Views
Last Modified: 2010-04-05
Hi all,

I've completed developing my system with Delphi 7, then, I began to realise that the users are not able to scan with the 2D Barcode scanner which is being hooked up to Com 1.

What should I do? Is there any extra coding required for this? If there are, how should I do it? Are there any third-party components that I can use to solve this problem?

Please advice.

Vivienne
0
Comment
Question by:vivienneyoong
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 12

Expert Comment

by:Ivanov_G
ID: 10936001

   Do you receive something from COM1 at all ... ? Is the barcode hook properly installed ?

   If you are looking for components :
   http://www.torry.net/pages.php?id=258
0
 

Author Comment

by:vivienneyoong
ID: 10936066
There is a response from COM1 but the only thing is that, it doesn't display anything on the edit box. Could it be that I need to install a component to enable it to read from COM Ports?

The 2D barcode scanner is hooked properly.

I've tried hooking up a 1D barcode scanner at the Serial Port (sharing the same port as the keyboard) and it works fine.

What could the problem be?
0
 
LVL 12

Expert Comment

by:Ivanov_G
ID: 10936287

   I have 2D barcode on D7 ... working... Try to see it your barcode reader works with some of these :

   http://www.taltech.com/products/bcindex.html

   I think your hook is somehow not working with 2D
0
 

Author Comment

by:vivienneyoong
ID: 10936353
Which port is your 2D barcode hooked up on?

Do you add in any special components or extra coding to help you to capture the values from the 2D barcode if hooked on COM 1?
0
 
LVL 12

Accepted Solution

by:
Ivanov_G earned 50 total points
ID: 10936401

   I am using it on COM2. With the reader I was given a DLL hook. I had to register it with regsvr32...
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question