Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Software Guide》 2006-17
Add to Favorite Get Latest Update

Intelligent Identification of the Path of Database by ADO in VB

Yu Weijia(Department ofComputer Science, Huazhong Normal University, Wuhan 430079)  
ADO is the Microsoft's new technology.Solutions to the path problem of accessing Access Database by ADO are given andexamples are provided in the article in the end .
【CateGory Index】: TP311.13
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 10 Hits
1 JIANG Huawei1,ZHENG Weizhi1,LI Zhansheng2(1College of Mechanical Engineering and Automation, Beijing Technology and Business University, Beijing 100037, China; 2HeNan Post&Telecom Planning&Designing Institute, Zhengzhou 450008,China);TECHNOLOGY OF VISITING DATABASE WITH VC[J];Journal of Beijing Technology and Business University (Natural Science Edition);2003-02
2 ZHANG Lei (Dept. of Computer and Information Engineering. Hongzhou University of Commerce, P. R. C, Hangzhou 310035, China);Using ADO Object to Dynamic access Access in VB[J];Journal of Changchun Teachers College;2004-05
3 ZHANG Hai-fei(School of Computer Science&Technology,Suchow University,Suzhou 215006,China);Use Delphi to Realize the Database Backup and Restore[J];Journal of Changchun Teachers College;2005-05
4 ZHANG Yong-mei, CHEN Li-chao, MA Li, GUO Shao-sheng(Dept. of Computer Science & Technology, North China Institute of Technology, Taiyuan 030051, China);Study on Software Test Technology[J];Journal of Test and Measurement Technology;2002-02
5 Deng Chuncong (Shaoguan Radio & TV University,Shaoguan,Guangdong,512026);Dynamic Merging Technique in C++[J];Journal of Guangdong Radio and Tv University;2002-03
6 ;计算机监控接口技术研究[J];Industrial Control Computer;2004-06
7 MAO Biao;Application of ADO Object to Database Operation In VB[J];Journal of Hubei TV University;2004-01
8 Liu Tianyin (School of Computer Science and Technology,Huangshi Institute of Technology,Huangshi Hubei 435003);Comparison and Selection of Several Database Access Techniques Based on VC++[J];Journal of Huangshi Polytechnic College;2005-04
9 He Junjie, Li Guangxi (Net Center,Ningbo University, Ningho 315211 );Protecting User Passwords with MD5 Algorithm[J];Computer Engineering;2000-S1
10 ZHANG Jianwei1,LI Xin2,ZHANG Meifeng1 (1.Department of Computer Science and Engineering, Zhenzhou Institute of Light Industry, Zhengzhou 450002; 2.Service Center of Social Affairs of Henan Province,Zhengzhou 450001);Study and Realization of Authentication Technique Based on MD5 Algorithm[J];Computer Engineering;2003-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved