Solved

VB6 / Crystal Reports

Posted on 2004-09-08
12
129 Views
Last Modified: 2010-05-02
I want to open a report when a button is clicked. How do I?
0
Comment
Question by:mwmiller78
  • 7
  • 5
12 Comments
 
LVL 18

Expert Comment

by:Sethi
ID: 12012025
0
 

Author Comment

by:mwmiller78
ID: 12074081
For some reason I cannot open this link. Does anyone know how to call a report?
0
 
LVL 18

Expert Comment

by:Sethi
ID: 12074148
You need to install Acrobat reader to open this link. Download free Acrobat Reader from www.download.com and this link would open easily.
0
 

Author Comment

by:mwmiller78
ID: 12074160
I have Acrobat installed already
0
 
LVL 18

Expert Comment

by:Sethi
ID: 12074322
Then I cant comment as I am able to open this link.
0
 

Author Comment

by:mwmiller78
ID: 12074344
You cannot open it either?
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 18

Expert Comment

by:Sethi
ID: 12074390
I can open it at my end
0
 

Author Comment

by:mwmiller78
ID: 12074392
Well, does anyone know what references I need to add in order to use the CRPEAuto?
0
 
LVL 18

Expert Comment

by:Sethi
ID: 12074400
Infact, if you have Crystal reports installed then in the folder where Crystal reports is installed, you will get a help folder. This file is there in the help folder also.
0
 

Author Comment

by:mwmiller78
ID: 12074403
Yeah, I found an HTML version of what I think you're looking at.
0
 
LVL 18

Expert Comment

by:Sethi
ID: 12074616
great...this document will tell u everything.
0
 
LVL 18

Accepted Solution

by:
Sethi earned 500 total points
ID: 12074624
You can also look at www.planet-source-code.com and serach Crystal Reports. You will get many projects with VB/CR combination.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Background What I'm presenting in this article is the result of 2 conditions in my work area: We have a SQL Server production environment but no development or test environment; andWe have an MS Access front end using tables in SQL Server but we a…
Since upgrading to Office 2013 or higher installing the Smart Indenter addin will fail. This article will explain how to install it so it will work regardless of the Office version installed.
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now