Solved

Explanation of BeforeReadingRecords, WhileReadingRecords, WhitePrintingRecords and EvaluateAfter

Posted on 2004-09-30
2
2,639 Views
Last Modified: 2008-03-04
I understand this may not be an easy question to answer briefly but I'll ask anyway. I was just wondering if someone could tell me about the 'BeforeReadingRecords', 'WhileReadingRecords', 'WhilePrintingRecords' and 'EvaluateAfter' constructs in Crystal. I've seen them used in lots of reports but I'm yet to use them myself as I don't fully understand their usage.
0
Comment
Question by:TerraKeith
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Accepted Solution

by:
vidru earned 250 total points
ID: 12196983
Have a look in the Crystal Help files.  Look in the Index under 'multi-pass reporting' and 'evaluation time functions'.

The Crystal/Business Objects site seems to be down at present, but there's also a document outlining the evaluation time functions here:
http://support.businessobjects.com/communityCS/TechnicalPapers/cr9_evaluationtimes.pdf.asp

-dave
0
 

Author Comment

by:TerraKeith
ID: 12208895
I didn't realise till the next day that I'd posted this question in the DB section and not crystal but not to worry I got an answer anyway. Thanks for the link, I'm printing it now and it should do just fine.
0

Featured Post

Upcoming Webinar: Securing your MySQL/MariaDB data

Join Percona’s Chief Evangelist, Colin Charles as he presents Securing your MySQL®/MariaDB® data on Tuesday, July 11, 2017 at 7:00 am PDT / 10:00 am EDT (UTC-7).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read about achieving the basic levels of HRIS security in the workplace.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question