How can a child navigatorContent access its parent?

I have 1 mx:ViewStack with 3 children s:NavigatorContent inside.

Ho can I get access to the child element (NavigatorContent) property SelectedIndex of the parent (ViewStack)?

I tried event.target.parent.parent.myViewStackid.selectedIndex = 1 but never succeed.

[using Flash Builder 4beta2]

Thank you very much

Hello

Yes disatching an event is the way to go.  Here's the same example with this extra.

Heres the Hotel component

http://ns.Adobe.com/MXML/2009.

xmlns:s = "library://ns.adobe.com/flex/spark".

xmlns:MX = "library://ns.adobe.com/flex/halo" width = "400" height = "300" >

protected function editButton_clickHandler(event:MouseEvent):void

{

dispatchEvent (new Event ('myButtonClick'));

}

]]>

[Event (name = "myButtonClick" type = "flash.events.Event")]

You can see the sent button event handler and event called myButtonClick.  Notice the tag .  This tells the compiler to flex what we call this event and the type of event it is.  Otherwise said, he will expose in mxml and you can listen to it in the main file.

This is the main file

http://ns.Adobe.com/MXML/2009.

xmlns:s = "library://ns.adobe.com/flex/spark".

"xmlns:MX ="library://ns.adobe.com/flex/halo"minWidth ="1024"minHeight ="768"xmlns:local =" * ">

protected function hotelcomp1_myClickHandler(event:Event):void

{

viewstack1. SelectedIndex = 0;

}

]]>

You can see here now in the viewstack in the mxml hotelComp that I have listed for the myButtonClick exactly as I would any other event and it called the hotel1Comp_myClickHandler that defines the index selected to 0.

Hope that is kind to you.

Andrew

Tags: Flex

Similar Questions

  • How can my child get around the parental control of Microsoft?

    I don't know how she does it.  It becomes by absolutely everything and visit Web sites that she shouldn't be able to.  She has a list of permissions.  I know she's on her cell phone and there are days when family safety said that there has been no activity.

    In addition, she has been able to download applications or software.  It's scary for me.  She was able to see the screen of others of his laptop computer.  What is c? Can you block apps like this to be downloaded?

    I'm just trying to protect my child!

    Thank you for your help.

    Lora

    I do not know the true ' in and out ' of this, but it seems that such things have been reported before. See the following links:

    http://answers.Microsoft.com/en-us/Windows/Forum/windows_other-security/child-can-bypass-time-limits-filter-on-family/0b503151-19ee-438A-a36f-2407f043b28f

    and

    http://answers.Microsoft.com/en-us/Windows/Forum/windows_other-security/sleep-bypasses-family-safety-settings/76bdd05b-11b5-42E6-B3DE-fbf9de4dd06f

    and

    http://answers.Microsoft.com/en-us/Windows/Forum/Windows_7-security/i-have-blocked-a-site-in-family-safety-but-my-son/e68a6a14-7eb1-4F6E-b56e-3eeaf3a58f4a

    As examples of similar sounding.

    For starters, dual control she has a 'user' and not an account "Admin". ( http://windows.microsoft.com/en-us/windows/change-users-account-type#1TC=windows-7 )


    I hope that someone can have better advice that personally I have never used Family Safety myself so I do not know its true limits.

    You can comment at microsoft here - http://support.microsoft.com/common/survey.aspx?scid=sw;en-us;2310&altStyle=MFE&renderOption=OverrideDefault&showpage=1&fr=1&nofrbrand=1 - but I don't know what use it really is.

  • How can I get an access icloud 4-digit code?

    How can I get an access icloud 4-digit code?

    You can reset the code and the keychain in iCloud will be replaced by the Keyring currently on your device.  To do this, follow the instructions under "If you don't have access to another approved... device". "in this article: iCloud: on iCloud cipher messages - alert Apple support.

    Otherwise, you will need to contact Apple support to prove your identity and get help, completion of the configuration of Keychain: http://www.apple.com/support/contact/.

  • How can I reinstall quick access? accidentally deleted

    accidentally deleted program?

    How can I reinstall quick access? accidentally deleted

    Hello

    try a restore of the system before this happened

    http://www.windowsvistauserguide.com/system_restore.htm

    If necessary do in safe mode

    Windows Vista

    Using the F8 method:

    1. Restart your computer.
    2. When the computer starts, you will see your computer hardware are listed. When you see this information begins to tap theF8 key repeatedly until you are presented with theBoot Options Advanced Windows Vista.
    3. Select the Safe Mode option with the arrow keys.
    4. Then press enter on your keyboard to start mode without failure of Vista.
    5. To start Windows, you'll be a typical logon screen. Connect to your computer and Vista goes into safe mode.
    6. Do whatever tasks you need and when you are done, reboot to return to normal mode.
  • How can I block others access to my wireless router?

    I have performance slow and even lose connections.  I have Comcast and they have suggested that it is 'noisy' of what they see on their end.  The technology said that he receives many complaints from users of wireless router.

    Hello

    Quote: "How can I block others access to my wireless router?

    By setting up the wireless router security encryption.

    Of the weaker for wireless security, more strong capacity is.

    No security
    Switch Off SSID (even has No Security. SSID can be sniffed easily even if it is turned off)
    MAC Filtering___ (Band Aid if nothing else is available, MAC number can be easily Spoofed).
    WEP64___ (Easy, "Break" by knowledgeable people).
    WEP128___ (a little more difficult to activate, but "Piraté" too).

    -------------------
    The three above are not considered safe.
    Safe starts here at WPA.
    -------------------

    WPA-PSK__(Very Hard to Break).

    WPA-AES__(Not functionally Breakable)

    WPA2___ (not functionally breakable).

    Note 1: WPA - AES the current interpretation level entry of WPA2.

    Note 2: If you use WinXP SP3 bellows and not updated, you need to download
    the WPA2 Microsoft's fix.

    Documentation of your devices (router wireless and computer wireless card) must indicate the type of security that is available with your wireless hardware.

    All devices MUST be set to the same level of security using the same password.
    Therefore, security must be set according to what is the best possible one of the wireless devices.

    I.e. even if most of your system may be able to be configured to the maximum with WPA2, but a device is able to be configured for maximum of the WEP Protocol, to the whole system must be configured to WEP.

    If you need more security and a device (such as a wireless card that can only do WEP) is now better security for the entire network, replace with a better device.

  • I want to be able to solve a problem on the computer of my mother in me. How can she give me access?

    original title: access to another computer at home

    I want to be able to solve a problem on the computer of my mother in me.  How can she give me access?

    You can use windows remote assistance to do this. Consult the following Web site for detailed information

    http://Windows.Microsoft.com/en-us/Windows-Vista/Windows-remote-assistance-frequently-asked-questions

    http://Windows.Microsoft.com/en-us/Windows-Vista/what-is-Windows-remote-assistance

    http://Windows.Microsoft.com/en-us/Windows-Vista/get-help-with-your-computer-using-Windows-remote-assistance

    http://Windows.Microsoft.com/en-us/Windows-Vista/what-is-Windows-meeting-space if this post can help solve your problem, please click the 'Mark as answer"If you find it useful, mark it as useful by clicking the 'Useful' button at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.

  • How can I prevent the access denied message when you use the shutdown command?

    I use shutdown /m \\computername/s

    I have "Access denied (5)" as an answer.
    I am admin on all my computers. Same username and password on each of them.
    How can I get this shutdown command to work remotely, so I can't access every computer command prompt via Remote Desktop?
    How can I prevent the access denied message when you use the shutdown command?

    Hello

    I suggest you to report this issue in TechNet Forums for Windows 7 networks: http://social.technet.microsoft.com/Forums/en-US/w7itpronetworking/threads

    Thank you.

  • How can I put the accession of photography to full?

    How can I put the accession of photography to full?

    Contact support Adobe by clicking here and, when available, click on "still need help," https://helpx.adobe.com/contact.html

  • How can I find and access a record of Mail in Mail El Capitan?

    In Mail on 10.8.5 - when I need to send an e-mail message, that I was able to search a folder, search for a message in this folder, select the message in the search results and then see and click on the name of the folder has resided in - take me directly to the folder nested within the appropriate e-mail account. Now, with El Capitan, it seems that this function no longer exists. How can I quickly find and access the files with in Apple Mail 10.11 El Capitan?

    Are you talking about looking for a folder in the Finder or in the mail?

  • Simple example of child to access the Parent data

    Hi all

    Im trying to explore and make sense of OOP.  Ive been learning as much as I can, but why cant seemt to extract data from a class parent child.  Ive put the child to inherit from the parent and creates an accessor parent to read and write.  I write the data in the parent class and then try to read data from the child's class. Is there something im missing? Anyone have or know a link to a simple example of this?

    Thank you

    Matt

    Ok.  I think you have a misunderstanding of the works the POO here.  The idea with OOP is that you can pass the child object in the parent methods and is in any case on this object.  Your drawing should look like this:

  • How can blackBerry smartphones, I access my ringtones, music, videos, photo files on my PC?

    How to access my ringtones, music, videos, files of photos on my PC?

     

    I did it a couple of times, but now I can't seem to access it easily.

    Dankees wrote:

    Thank you Jeff - you behave! Bravo.

    So, can I just plug the micro SD card into my card reader and then I'll have access? Don't I have that right? (It makes sense).

    Thank you!

    Yes, you can see the contents of the folder video, photos, music etc...

    you will have access only to your articles, not those preinstalled on the phone

  • How can I clear counters access-list on a pix firewall

    How can I erase the hitcounts on an on a pix firewall access list without resetting the pix?

    It would be clear access-list on a router counters.

    Thanks in advance

    Steve

    access list counters Clear

  • How can I get my computer password parental control

    How can you recover my password for the parental control computer. someone create a parental control password in my laptop.

    Hello

    I see that you want to delete or reset the parental control password. I'll help you with this problem.

    Parental control password is defined by someone with administrative privileges on the computer. You must contact that person to reset or remove the password.

    Refer.

    Set up Parental controls: http://windows.microsoft.com/en-US/windows7/Set-up-Parental-Controls

    I hope this helps.

  • How can I provide full access to my user accounts?

    Original title: multi-user

    I have 2 user accounts on my windows PC 8.1. How can I change things so that each account has full access to the files of othe'rs (documents, etc.)?

    Hello

    Thanks for posting your query on the Microsoft Community.

    Thank you for details on the issue and we are happy to help you.

    Connection to one of your user account (Administrator/Microsoft). Follow the steps to change the other user account to the administrator account:

    1. Right-click on the Start button and click Control Panel.
    2. Click on user accounts.
    3. Click Manage another account.
    4. Select and click the other user account in the user accounts list.
    5. Click change the account type.
    6. Check the mark on administrator and click Change the account Type .

    Now, we will have full access to your other accounts files and documents.

    Reference: Please refer to the following Microsoft article: What are user account control settings?

    http://Windows.Microsoft.com/en-in/Windows/what-are-user-account-control-settings#1TC=Windows-8

    Hope this information is useful. Let us know if you need more help, we will be happy to help you.

    Thank you.

  • How can I activate internet access EBS

    Dear all,

    Sorry if this has been raised before. I try to search but I have not found.

    my query is how can I activate or open the EBS application to be accessible from the internet?
    many course taking account of safety, since the apps of the EBS and DB server in our internal LAN area.
    What is the best architecture to enable this in the internet?

    is there a reference that I can learn to.

    Thank you
    Robert Siregar

    Hi Robert,.

    Sorry if this has been raised before. I try to search but I have not found.

    Please see this link - https://forums.oracle.com/forums/search.jspa?threadID=&q=Access+AND+Internet&objID=c3&dateRange=all&userID=&numResults=15&rankBy=10001

    my query is how can I activate or open the EBS application to be accessible from the internet?
    many course taking account of safety, since the apps of the EBS and DB server in our internal LAN area.
    What is the best architecture to enable this in the internet?

    is there a reference that I can learn to.

    You have two options:

    (1) unsecured: using the actual IP address and this way, that no additional configuration is required unless you need to purge the FND_NODES table and fills again again.

    How to clean non-existent nodes and IP addresses ranging from FND_NODES [ID 260887.1]
    How to get a clean auto-configuration environment? [391406.1 ID]

    (2) course: using DMZ, but it will require configuration/configuration / hardware.

    Additional configuration and deployment in version 1 Options
    https://blogs.Oracle.com/stevenChan/entry/additional_configuration_and_d

    Troubleshooting configurations DMZ for Apps
    https://blogs.Oracle.com/stevenChan/entry/troubleshooting_dmz_setups_for

    What does "DMZ Certification"?
    https://blogs.Oracle.com/stevenChan/entry/what_does_dmz_certification_me

    Depth: Demilitarized zone and E-Business Suite
    https://blogs.Oracle.com/stevenChan/entry/indepth_demilitarized_zones_an

    DMZ Application Security
    https://blogs.Oracle.com/muralins/entry/securing_dmz_application

    Applications that run across a firewall
    https://blogs.Oracle.com/Millmore/entry/applications_running_through_a

    Thank you
    Hussein

Maybe you are looking for