Solved

Which component(s) to use

Posted on 2009-05-18
3
183 Views
Last Modified: 2012-05-07
Dear experts,

I have a picture of a programm that i want to build the same.
Below you see a seach-part, what component(s) do I have to
use to make that?

Greetings,

Peter Kiers
Example.jpg
0
Comment
Question by:peterkiers
3 Comments
 
LVL 5

Expert Comment

by:xr1140
ID: 24409663
in Raize Components (http://www.raize.com/DevTools/RzComps/Default.asp) you will find all the component you need to clone the application from the screenshot
0
 
LVL 9

Accepted Solution

by:
arioh earned 500 total points
ID: 24409666
TListView
ViewStyle := vsReport
0
 
LVL 1

Author Comment

by:peterkiers
ID: 24409711
arioh 500 p's comming to you...

Greetings, Peter Kiers
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

A lot of questions regard threads in Delphi.   One of the more specific questions is how to show progress of the thread.   Updating a progressbar from inside a thread is a mistake. A solution to this would be to send a synchronized message to the…
Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question