Thank you very much Johny! BUT!
I can evaluate the key pressed with keypress event, but I cannot make the cursor to leave this textbox and to move to the next textbox. My example: PUBLIC SUB factura_KeyPress() IF Key.Code = Key.Enter OR Key.Code = Key.Return THEN ' here is neccesary a command for the cursor to leave the current object and to move to next object. ENDIF END Is a function or command to make this? Is a system variable where I can increase the number of the current object? Regards, Zoly B. 2010. 10. 4, hétfő keltezéssel 11.15-kor Johny Provoost ezt írta: > Op 04-10-10 11:02, Zoltan Biro schreef: > > Hello everybody.. > > > > Can somebody told me how I can make the cursor to leave textbox > > with a simple<Enter> key? > > By defaul I can leave these controls only with the tab or directional > > keys..this is very unconfortable. > > Thank you for your answer in advance. > > > > Best regards, > > Zoli B. > > > > ------------------------------------------------------------------------------ > > Virtualization is moving to the mainstream and overtaking non-virtualized > > environment for deploying applications. Does it make network security > > easier or more difficult to achieve? Read this whitepaper to separate the > > two and get a better understanding. > > http://p.sf.net/sfu/hp-phase2-d2d > > _______________________________________________ > > Gambas-user mailing list > > [email protected] > > https://lists.sourceforge.net/lists/listinfo/gambas-user > > > > > > look in the sub txtfield_KeyPress > if the key.code is Enter or Return then you can do someting. In my > example a button is automatically pressed. > > PUBLIC SUB txtZoek_KeyPress() > IF Key.Code = Key.Enter OR Key.Code = Key.Return THEN > ZoekAdres.btZoek.Value = 1 > ENDIF > END > > Greetings, > Johny > > ------------------------------------------------------------------------------ > Virtualization is moving to the mainstream and overtaking non-virtualized > environment for deploying applications. Does it make network security > easier or more difficult to achieve? Read this whitepaper to separate the > two and get a better understanding. > http://p.sf.net/sfu/hp-phase2-d2d > _______________________________________________ > Gambas-user mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/gambas-user ------------------------------------------------------------------------------ Virtualization is moving to the mainstream and overtaking non-virtualized environment for deploying applications. Does it make network security easier or more difficult to achieve? Read this whitepaper to separate the two and get a better understanding. http://p.sf.net/sfu/hp-phase2-d2d _______________________________________________ Gambas-user mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/gambas-user
