This website uses cookies to ensure you have the best experience. Learn more

E Mail Import From Access Using Delphi

581 words - 2 pages

As part of Project Management in a Certificate IV in IT, our project team was required to create a database that would simplify the work of one of the teachers at the senior college I was attending.The database consisted of five tables being Students, Student Interests, Interests, Position Interests and Positions. The database was centered on carefully chosen interests. For clarity I will not go into any detail here.Once the database had been completed, the teacher wished to have a sort of automatic contact available for positions that were available for students to apply for (again by interest).A query was exported to a file containing the fields relevant to the position including the student name and the details of the position.Delphi development arose when I needed to read the exported semi-colon-delimited text file and transfer it into a readable e-mail and automatically send each e-mail.The main code for the Delphi program follows and is available to modify and use by other Delphi developers if they have a database of contacts that they wish to e-mail. I also apologise for the non-standard naming of the components.{ Mailer unit follows. }unit mailer;interfaceusesWindows, Messages, SysUtils, Classes, Graphics, Controls, Forms, Dialogs,NMpop3, StdCtrls, Psock, NMsmtp, Mask, ComCtrls, Math, Menus, ExtCtrls, Registry;typeTForm1 = class(TForm)Mailer: TNMSMTP;Memo1: TMemo;ReplyToLbl: TLabel;ReplyToEdit: TEdit;StatusBar: TStatusBar;BCCLbl: TLabel;BCCText: TMemo;OpenDialog: TOpenDialog;MainMenu1: TMainMenu;File1: TMenuItem;OpenListForBCCAddresses1: TMenuItem;Connect1: TMenuItem;Account1: TMenuItem;EditAccountDetails1: TMenuItem;Bevel1: TBevel;Panel1: TPanel;Label3: TLabel;MyListBox: TListBox;procedure CheckerConnectionFailed(Sender: TObject);procedure EditAccountDetails1Click(Sender: TObject);procedure Connect1Click(Sender: TObject);procedure OpenListForBCCAddresses1Click(Sender: TObject);procedure AddStrings(S: String);private{ Private declarations }public{ Public declarations }end;varForm1: TForm1;i: Integer;Count: Integer;EAD: Boolean;implementationuses account;{$R *.DFM}procedure TForm1.CheckerConnectionFailed(Sender: TObject);beginStatusBar.SimpleText := 'Connection Failed';end;procedure TForm1.EditAccountDetails1Click(Sender: TObject);beginEAD := true;Form2.ShowModal;end;procedure TForm1.Connect1Click(Sender: TObject);beginEAD := false;Form2.ShowModal;beginMailer.Host := Form2.HostEdit.Text;Mailer.UserID := Form2.UserEdit.Text;StatusBar.SimpleText := 'Attempting to connect and send';Mailer.Connect;if Mailer.Connected thenbeginStatusBar.SimpleText := 'Mailer connected...';Mailer.ClearParams := false;Mailer.SubType := mtPlain;Mailer.EncodeType := uuMime;end;Mailer.PostMessage.FromAddress := 'dempster@tsc.sa.edu.au';Mailer.PostMessage.FromName := 'Essie Dempster';Mailer.PostMessage.Date := DateToStr(Date());Mailer.PostMessage.ReplyTo := ReplyToEdit.Text;Mailer.PostMessage.ToBlindCarbonCopy.Text := BCCText.Lines[0];Mailer.PostMessage.Body.Text :=...

Find Another Essay On E-mail import from Access using Delphi

Delphi Essay

1897 words - 8 pages History of Delphi ?Zeus according to the Greek legend once wished to determine the exact centre of the earth.? So he released two eagles from opposite ends of the world.? Flying towards each other they met precisely over Delphi.?[1]? So, according to this legend and historians, Delphi was known as the center of the world to the Ancient Greeks, starting in the 6th century BCE.? ? Excavations have shown that the Mycenaeans (in Greece from

Email: A plus or minus Essay

705 words - 3 pages E-mail is defined as ?the exchange of computer-stored messages by telecommunications?(WhatIs.com Inc). With the ever-increasing popularity of the Internet, e-mail has defined the way we communicate with the world around us. From the simple use of contacting family and friends, to becoming a tool used by businesses to exchange correspondence with employees and clients; e-mail has developed into leading method of communication on the Internet

The future of email

870 words - 3 pages late December, 2005 said they used emails to make purchases; 50.2 percent said email had influence on their shopping habits. (Return Path 2006) From receiving emails, I also purchased a number of items ranging from contacts, shoes, and tickets from online businesses. With efficiency, businesses try to look for ways to reach their results with a minimum expenditure of energy, time, and money. E-mail provides a way for them to accomplish those

Business Forecasting Assignment Operations Management MGT/554

1369 words - 5 pages knowledge from a group of experts by means of a series of questionnaires interspersed with controlled opinion feedback (Chase, 2003, P471).The Delphi method is a variation of the executive committee approach. But the interaction is indirect, iterative and structured. The basic premise of Delphi method is to identify a group of experts and each of them are given a set of questions or issues, and asked to respond. After a given amount of time, the

E-mail And Normal Mail

862 words - 3 pages post offices and you aren't confirmed whether your mail transported or not.Nonetheless,you don't need to leave from home for sending e-mail,but you have to find a post office to send your mail.Another difference is in the cost of sending e-mail and normal mail.Although it is quite cheap to send e-mail to someone in another part of the world, the cost of sending normal mail is more expensive than e-mail and the cost depends on the distance between

The Privacy of E-Mail

1322 words - 5 pages The Privacy of E-Mail Today the Internet is being used more and more frequently, and the question of e-mail privacy is becoming more and more of an issue in society. Many people today, both at work and at home, are using e-mail to keep in touch with their friends, family, and their co-workers. Sometimes the information that is contained in these messages is private and confidential, neither the sender nor the receiver wish any one else to

The Right to Privacy for Employees and Their Email

888 words - 4 pages or using company communications equipment to harass their co-workers? (?Monitoring Your Employees' Email?). As employees download materials from their e-mail to computer workstations, it was found that 85% detected computer viruses. ?The Melissa virus alone has been estimated to cost businesses many millions of pounds. The ?iloveyou? virus went Page 2 around the world in a matter of hours, infecting many large and small companies? systems. The

EMail Privacy Rights In Business

4600 words - 18 pages taken control over the information technology arena like personal computers. Consider, however, the items that go along with personal computers: printers; modems; telephone lines for your modem; scanners; the software; online access; and lets not forget, e-mail addresses. E-mail, or electronic messaging, has taken over the communications world as the preferred method of exchanging information. From the simple, "let's do lunch" messages, to the

Introduction to Databases

1018 words - 4 pages , and we use Access to provision a customers order for Internet service to coincide with the provisioning of their phone service. In using Access to track all incoming e-mail from customers to us we have two databases, in the first database I enter the date the e-mail came in, the hour the e-mail(s) came in from a drop down menu and enter the number of e-mail(s) that came in during that hour. This database is used every three months to track e

Internet Provides New Ways to Communicate

1703 words - 7 pages long distance make webcams beneficial to education, long distance communication and personal relationships. Technology has changed, advancing our way of communicating. What once was telephone and postal mail for communication has not fully been replaced, but has advanced beyond to internet communication. With the overwhelming access to computers Instant Messaging, E-mail and Webcams have become the new and improved form of communication

Post Office Protocol

1373 words - 5 pages the Internet.SMTP is a TCP/IP protocol used in sending and receiving e-mail. Where you send e-mail with SMTP and a mail handler receives it on your recipient's behalf. Then the mail is read using POP or IMAP, that lets the user save messages in a server mail-box and download them periodically from the server, this is because SMTP is limited in its ability to queue messages at the receiving end. Users typically use a program that uses SMTP for

Similar Essays

Some Organizations Have The Technology To Monitor All The Electronic Activities Of Its Staff, From E Mail To Keystrokes. Is This Acceptable?

1075 words - 4 pages misuse of privileges granted by a company with regards to the Internet - the most significant being the loss of productivity. How much money is a company losing when John Doe browses the Internet and 30-40% of this is not related to work? Not only this, but other issues are raised as well, such as safety. In a survey conducted by Elron Software of Burlington, Massachusetts, one in five employees receives at least one potentially offensive e-mail

Is E Mail Always Better Than Snail Mail?

803 words - 3 pages mail." E-mail also has the advantage of being less expensive, for most people, than regular mail. Many people have access to e-mail for free through their work or school. And while some people may pay for e-mail through an online service, there is no increase in cost relative to the number of messages sent. It is the same price to send one message to one person as it is to send messages back and forth all day or to a hundred people

Delphi Method Influence In Sales Forecasting

836 words - 4 pages relates to sales forecasting. Works Cited Dalkey, N., & Helmer, O. (1963). An experimental application of the Delphi method to the use of experts. Management Science, 9(3), 458-467. Retrieved from https://ehis-ebscohost-com.csuglobal.idm.oclc.org/ehost Hicham, A., Mohammed, B., & Anas, S. (2012). Hybrid intelligent system for sale forecasting using Delphi and adaptive fuzzy back-propagation neural networks. International Journal of

Research Methodology: Delphi Technique Essay

1872 words - 7 pages ). References Firat, K. A., Woon, W. L., & Madnick, S. (2008, September). Technological Forecasting - A Review. Composite Information Systems Laboratory (CISL). Retrieved February 12, 2014 Fong, S. F., Ch'ng, E. P., & Por, P. F. (2013). Development of ICT Competency Standard Using the Delphi Technique. INTERNATIONAL EDUCATIONAL TECHNOLOGY CONFERENCE. doi:10.1016/j.sbspro.2013.10.338 Johnson, L., Becker, S., Estrada, V., & Freeman, A. (2014