Solved

Search thorugh Access Database

Posted on 2002-06-11
5
201 Views
Last Modified: 2012-06-22
Is there a way to search through all objects of a database to see if a particular object is being used?  FOr example, if I want to delete a query but don't know if it is being used in a macro or another query or a report, is there a quick was to search and find out?
0
Comment
Question by:melissalutz1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 5

Expert Comment

by:bob_online
ID: 7070012
no, not in any version of access I've used.
0
 
LVL 5

Expert Comment

by:bob_online
ID: 7070018
Depending on what you're trying to accomplish, and the size of the database, the safest way to find out is to rename the object by putting an x in front of the name and then running the all of the code, queries, macros, etc.  If something doesn't work, just remove the x.
0
 

Expert Comment

by:podekerken
ID: 7072451
Rick fisher wrote add-in called something like Find & replace.
A very powerfull tool to do your cross examining.
www.rickworld.com

With kind regards Peter Odekerken
0
 
LVL 54

Expert Comment

by:nico5038
ID: 7242022

No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in Community Support that this question is:
 - PAQ'd and pts removed
Please leave any comments here within the
next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER !

Nic;o)
0
 
LVL 5

Accepted Solution

by:
Netminder earned 0 total points
ID: 7269286
Per recommendation, points NOT refunded and question closed.

Netminder
CS Moderator
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Traditionally, the method to display pictures in Access forms and reports is to first download them from URLs to a folder, record the path in a table and then let the form or report pull the pictures from that folder. But why not let Windows retr…
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
Using Microsoft Access, learn some simple rules for how to construct tables in a relational database. Split up all multi-value fields into single values: Split up fields that belong to other things into separate tables: Make sure that all record…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question