I would like to make my GUI more user friendly than merely having forms or reports with no data for tables that the user does not have read permissions for. For less than expert computer users, going to a form that is missing data will only confuse them.
I have already written a PushForm...
I am using Access 2000. I have several frontends that are linked to several backends. How are the table permissions managed for the backends? And how are the form and report permissions handled for the frontends? Since the backend files are always on the customer's network, once the backend...
I am using Access 2000 with MDA files containing routines that are used across several frontend applications. I am also using class modules, but due to the limitations of A2K, the class modules must be located in the frontend or open/called/closed via a routine located in the MDA that contains...
I own CR 9 Developer and am using MS Access 2000. I also own MS Office Enterprise which gives me the A2K files and license so I can distribute the A2K runtime files. I need to distribute the data and reports via CD. What files do I need to distribute to the end-users so they can run the CR...
If you only need to send email from Access and not receive email, then the easiest way is using the shareware program Blat. I just found Blat and it works great!! Sending email out of Access via Outlook is a pain--from both the programmer's and user's perspectives--due to all the security in...
In the VB script before running your set of action queries, place this statement: DoCmd.SetWarnings False. When done running the queries, run this statement: DoCmd.SetWarnings True. If you are running your queries via macros, there look for the SetWarnings action.
Sometimes when table fields are rename, the form's script does not recognize them--at least in Access 2000 this happens to me all the time. To fix this, open the form in design view, select the value for the form's RecordSource property box and press <Ctrl-X> to cut it out and put on the...
If your db file name is Contact.mdb, look for a file called Contact.bak. The security wizard sometimes creates a BAK file which is the original and the new Contact.mdb is the one that the wizard applied the security to.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.