Solved

MSAccessDB not updating

Posted on 2001-06-09
11
200 Views
Last Modified: 2006-11-17
PHP Version 4.0.5
MsAccess 2000.

Connecting to Msaccess through a web page (PHP) via
ODBC connection.

Select queries work fine.

But a simple update query fails.

No error messages ..... the result object == TRUE.

in other words I check to see if the
$Result = odbc_exec($Conn, $stmt);
if ($Result)
{
  output error msg etc. never gets executed
}

I am about to head home from work now but I will do my best to keep up with any replies from home.

-thx for you help

-Neil
0
Comment
Question by:neilhoman
  • 5
  • 3
  • 2
  • +1
11 Comments
 
LVL 8

Expert Comment

by:us111
ID: 6171627
is your databse in your web root (bad for security) ??
Maybe the permission of the database is READ only due to the user IUSR_.....

Check the permission and check the attribute of the file (maybe read only as well)

0
 

Author Comment

by:neilhoman
ID: 6176651
IUSR_ has full control of the the directory in which it is located.
It is not web shared however... the update simply runs but simply doesnt update the record. Even though the query does not fail.
I have pasted the query into other odbc query tools and the query runs successfully.

This is why I have posted in this forum... I feel it could be more a php/web problem than an access problem.

-neil
0
 

Author Comment

by:neilhoman
ID: 6176668
when I say an access problem I mean MSaccess...
->
Perhaps there is and ini setting that is feckin it up.
like I say read queries run fine the update query does not fail .... it is almost like the update isnt commiting.
0
 
LVL 1

Expert Comment

by:Moondancer
ID: 6419200
It's time to clean up this topic area and that means taking care of this question. Your options at this point are:

1. Award points to the Expert who provided an answer, or who helped you most. Do this by clicking on the "Accept Comment as Answer" button that lies above and to the right of the appropriate expert's name.

2. PAQ the question because the information might be useful to others, but was not useful to you. To use this option, you must state why the question is no longer useful to you, and the experts need to let me know if they feel that you're being unfair.

3.  Ask Community Support to help split points between participating experts.  Just comment here with details.

4.  Delete the question because it is of no value to you or to anyone else.  To use this option, you must state why the question is no longer useful to you, and the experts need to let me know if they feel that you're being unfair.

If you elect for option 2, 3 or 4, just post comment with details here and I'll take it from there.  We also request that you review any other open questions you might have and update/close them.  Display all your question history from your Member Profile to view details.

PLEASE DO NOT AWARD THE POINTS TO ME.

____________________________________________



Hi Experts:

In the event that the Asker does not respond, I would very much appreciate your opinions as to which Expert ought to receive points (if any) as a result of this question.  Likewise, you can also suggest that I PAQ or delete the question.

Experts, please do not add further "answer" information to this question.  I will be back in about one week to finalize this question.

Thank you everyone.

Moondancer :)
Community Support Moderator @ Experts Exchange

P.S.  REGARDING POINTS, Guidelines and more:  http://www.experts-exchange.com/jsp/cmtyHelpDesk.jsp  
0
 
LVL 5

Expert Comment

by:andriv
ID: 6930175
In the attempt to help clean up abandoned Questions, I will ask Community Support to delete this question A.S.A.P.

If any expert feels the points should be awarded you can post a request in Community support (please
include this link)
The link to the Community Support area is: http://www.experts-exchange.com/jsp/qList.jsp?ta=commspt

Please do not accept this comment as an answer!

Andriv
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 

Author Comment

by:neilhoman
ID: 6930192
No answer... Problem not solved
0
 

Author Comment

by:neilhoman
ID: 6930193
No answer... Problem not solved
0
 
LVL 5

Expert Comment

by:andriv
ID: 6930200
Are you still looking for an answer? If you are post your update query so I can take a look.
0
 

Author Comment

by:neilhoman
ID: 6930203
No I have since moved jobs.
Sorry about that andriv the last thing (are you a moderator) the last thing I wanted to do was leave a question hanging about on a service that is so useful to me.

Thanx for the offer of help...
im makin a new php site at the moment no doubt I will need your help at some stage.

Apoligies and regards,
-Neil
0
 
LVL 5

Expert Comment

by:andriv
ID: 6930217
No problem neilhoman. In the future go to 'community support' when ever your question goes unsolved and request it to be deleted and it will be reviewed for deletion.
0
 
LVL 1

Accepted Solution

by:
Moondancer earned 0 total points
ID: 6931138
Thanks to you both.

I have refunded your points to you, Neil, for this question and moved it to the PAQ at zero points to close it.  This way, when you wish to pursue further, you can post a new question and point to this link as reference to minimize additional back-tracking and work in the new effort.

Moondancer - EE Moderator
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Popularity Can Be Measured Sometimes we deal with questions of popularity, and we need a way to collect opinions from our clients.  This article shows a simple teaching example of how we might elect a favorite color by letting our clients vote for …
Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now