Solved

access 2000

Posted on 2001-06-26
8
143 Views
Last Modified: 2010-04-06
Hi all!
i want to create an access 2k based application, but the only format my app support is the access 97 one. could someone tell me how i should process to support access 2k (for the moment, i only use a TTable and a TDataSource component).

regards, ralph
0
Comment
Question by:ralph78
8 Comments
 
LVL 27

Expert Comment

by:kretzschmar
ID: 6227558
use ado-components instead
0
 
LVL 22

Expert Comment

by:mnasman
ID: 6227587
Hello

  BDE only support access 97, if you need to use access2000, you have to work with ADO components, but you need to have Delphi 5 enterprise edition, or u can buy them seperatly if u have delphi 5 pro, if you want to learn ADO with access read this article
http://delphi.about.com/compute/delphi/library/weekly/aa010101a.htm

Best regards
Mohammed Nasman
0
 
LVL 13

Expert Comment

by:Epsylon
ID: 6227618
I can connect to it using ODBC on Windows 2000 Professional an Delphi 5 Enterprise.

But I prefer using ADO too.
0
 

Expert Comment

by:coffeetea
ID: 6227977
I can connect to access 2k using ODBC above windows 95!
So we use TTable or TDatabase etc to access databse!
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 4

Expert Comment

by:jsweby
ID: 6230296
Just for another alternative, try Titan Access for Delphi, www.reggatta.com.

J.
0
 

Expert Comment

by:amp072397
ID: 6789582
ralph78:

Just a friendly reminder to return to your open questions.

thanks!
amp
community support moderator

2/7
0
 
LVL 26

Expert Comment

by:Russell Libby
ID: 8685454
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:

To be PAQ/Refund

Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
Thank you,
Russell

EE Cleanup Volunteer
0
 

Accepted Solution

by:
PashaMod earned 0 total points
ID: 8816175
PAQ'ed and points not refunded,

PashaMod
Community Support Moderator @Experts Exchange
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now