?
Solved

Remove and add an extension.

Posted on 2007-03-21
1
Medium Priority
?
128 Views
Last Modified: 2010-04-23
strCSVZipFlatFileName = StrFileName & ".zip"


There is a bug above and we need to make sure that the below .csv is replace by .zip.
What should I do to replace the above to conform to this?
"C:\SourceControl_mcupryk\InHouseDev\INTRANET\Intranet_DEVEL_2005\StoreSupply\AssignmentEGCNumber\tmpdownload\P.safeway_assigned.20070321_1034.csv"
0
Comment
Question by:mathieu_cupryk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 67

Accepted Solution

by:
sirbounty earned 1000 total points
ID: 18764241
strCSVZipFlatFileName = Replace(StrFileName, ".zip", ".csv")

or more .net~ish...

strCSVZipFlatFileName = StrFileName.Replace(".zip", ".csv")

0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Well, all of us have seen the multiple EXCEL.EXE's in task manager that won't die even if you call the .close, .dispose methods. Try this method to kill any excels in memory. You can copy the kill function to create a check function and replace the …
Introduction As chip makers focus on adding processor cores over increasing clock speed, developers need to utilize the features of modern CPUs.  One of the ways we can do this is by implementing parallel algorithms in our software.   One recent…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question