You are here

Press the Go WDZ Button

In "Data Tables" there are a few tables associated with a shop. Once you press the "Go WDZ" Button, then all the code and forms that you require go into the designer studio, so that you can modify all the forms and the lists that you require as well as obtain the code needed. Click on the edit icon to view, the lists and forms. In the demo system you can edit your lists and forms here, while the other three modes show, the list views, the panel view and the code.

Editing Table

This is the generated list view with some dummy information for User

    • Edit
    • Salutation
    • First Name
    • Surname
    • Email
    • Tel
    • Edit - 1
    • Mr
    • exuFirstName
    • exuSurname
    • support@web-d-zine.co.uk
    • +447436112854
    • Edit - 2
    • Ms
    • exuFirstName
    • exuSurname
    • support@web-d-zine.co.uk
    • +447436112854

Designer - List EXIT

    • Edit
    • Minor Code
    • Seq
    • Code
    • Name
    • Hdr Title
    • In Use
    • Sort
    • Display
    • Edit - 2113
    • list
    • 0
    • exuId
    • Edit
    • The Primary Id is used in back end systems to retrieve the record
    • true
    • false
    • Key
    • Edit - 2114
    • list
    • 5
    • exuKey
    • Key
    • The key is used to group children records together
    • false
    • false
    • Edit - 2115
    • list
    • 10
    • exuSalutation
    • Salutation
    • Salutation such as Mr. Mrs etc.
    • true
    • false
    • Edit - 2116
    • list
    • 15
    • exuFirstName
    • First Name
    • First name, initials etc. In this case the information is encrypted so that the name is not readable in the data base. So that you can search the record, a separate field is created which is encrypted in such a way, that it is still encrypted, but is also searchable.
    • true
    • false
    • Edit - 2117
    • list
    • 20
    • exuSurname
    • Surname
    • Last name of person. In this case the information is encrypted so that the name is not readable in the data base. So that you can search the record, a separate field is created which is encrypted in such a way, that it is still encrypted, but is also searchable.
    • true
    • false
    • Edit - 2118
    • list
    • 25
    • exuEmail
    • Email
    • Email address - In this example the the email address is being used to retrieve the record, but is also encrypted. There is one disadvantage of using a retrieve on an encrypted field and that is you can not make the field unique. So you will need to add external code to make sure that you only have one user with that email address.
    • true
    • false
    • Email
    • Edit - 2119
    • list
    • 30
    • exuTelephone
    • Tel
    • Encrypted telephone number can be used for personal telephone numbers
    • true
    • false
    • Telephone
    • Edit - 2120
    • list
    • 35
    • exuPassword
    • Password
    • The password is modified so that it is unreadable in the data base. The SQL function password is used for this type
    • false
    • false
    • Password
    • Edit - 2121
    • list
    • 40
    • exuDate
    • Date
    • Date, the default for this date is today, which is a special instruction that puts today's date in as the default
    • false
    • false
    • Edit - 2122
    • list
    • 45
    • exuStartDate
    • Start Date
    • Start date, the default for this date is today, which is a special instruction that puts today's date in as the default
    • false
    • false
    • Edit - 2123
    • list
    • 50
    • exuSpare1
    • Spare 1
    • Used for expansion
    • false
    • false
    • Edit - 2124
    • list
    • 55
    • exuSpare2
    • Spare 2
    • Used for expansion
    • false
    • false
    • Edit - 2125
    • list
    • 60
    • exuSpare3
    • Spare 3
    • Used for expansion
    • false
    • false

Minor Change

The only minor change between the code produced and what you see here, is that the edit facilities have been used to modify the lists