Solved

Duplicate attachment found in the bottom of the form

Posted on 2006-06-26
6
290 Views
Last Modified: 2013-12-18
Hi Guys,

i have a  Rich Text field in the form where the user attach their files(excel),the attachment is placed in the Rich Text field but an additional icon for the file appears at the bottom of the form. I cant figure out what is the solution.

Thanks,
Ariel Duno

0
Comment
Question by:amd1979
  • 2
6 Comments
 
LVL 19

Expert Comment

by:madheeswar
ID: 16983632
create $V2AttachmentOptions Coputedfordisplay field and give zero as default value.
0
 
LVL 18

Expert Comment

by:marilyng
ID: 16985457
Notes Client or Web?  

Maddy, question, doesn't the @V2 only work on WEB?  

So, if this is web, then excuse my post!

0
 

Author Comment

by:amd1979
ID: 16990923
Now Client only but sooner or later we're going to implement this on web.
0
 
LVL 18

Accepted Solution

by:
marilyng earned 250 total points
ID: 16997530
Maddy's solution works on the web.

http://www-1.ibm.com/support/docview.wss?uid=swg21099682 << see here for client.

Basically, you use subforms, one with the richTExt field editable, and another with the richtext field computed and nested in a controlled access section.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

You’ve got a lotus Domino web server, and you have been told that “leverage browser caching” is a must do. This means that we have to tell the browser everywhere in the web to use cache. In other words, we set (and send) an expiration date in the HT…
For beginners of Lotus Notes user this is important to know about the types of files and their location supported by IBM Notes. Mostly users are unaware about how many file types are created and what their usages are. This Article is fully dedicated…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question