On Monday 04 October 2010 21:15:13 Rolf-Werner Eilert wrote: > Am 04.10.2010 06:08, schrieb richard terry: > > Having wasted a couple of frustrating hours on this simple task, I > > thought I'd ask the list. > > > > I have a 3 column column view. I want to set the sizes of this to a user- > > defined width (I've put in the code to save this ok), but for the moment > > to be concete lets say these are the values: > > > > If I put this up the top of my subroutine: > > > > cvwResults.Columns[0].width = 70 > > cvwResults.Columns[1].width = 179 > > cvwResults.Columns[2].width = 180 > > > > Then load the columnview with data: > > > > x = results_received!pk_document > > cvwResults.Add(x, 0) > > cvwResults[x][0] = Format(results_received!date_created, > > "dd/mm/yyyy") > > cvwResults[x][1] = result_received 'results_received!tag_user > > cvwResults[x][2] = results_received!originator > > > > Then the column widths as re-set and the columnview expands the columns > > to whatever it wants, as dictated by the widest bit of data . > > > > Any help appreciated as I'm about to slit my wrists over this one!!!!! I > > would have thought it was simple. I looked at all the columnview > > properties to no avail. > > > > Regards > > > > ricahrd > > Just a guess: Try setting the column width AFTER filling them. Does that
Not at all, one can try alot of combinations and permutations when struggling for an hour. Regards Richard > help? > > Regards > > Rolf > > > --------------------------------------------------------------------------- > --- Virtualization is moving to the mainstream and overtaking > non-virtualized environment for deploying applications. Does it make > network security easier or more difficult to achieve? Read this whitepaper > to separate the two and get a better understanding. > http://p.sf.net/sfu/hp-phase2-d2d > _______________________________________________ > Gambas-user mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/gambas-user > ------------------------------------------------------------------------------ Virtualization is moving to the mainstream and overtaking non-virtualized environment for deploying applications. Does it make network security easier or more difficult to achieve? Read this whitepaper to separate the two and get a better understanding. http://p.sf.net/sfu/hp-phase2-d2d _______________________________________________ Gambas-user mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/gambas-user
