Solved

Could not open MS Access 2000 File - Msysdb missing

Posted on 2004-04-26
5
1,073 Views
Last Modified: 2012-08-14
When I am trying to open a MS Access 2000 file, it shows "The Microsoft Jet database engine could not find the object "Msysdb". Make sure the object exists and that you spell its name and the path name  correctly."

Anybody who provides help will be appreciated.
0
Comment
Question by:Alwu
5 Comments
 
LVL 50

Accepted Solution

by:
Steve Bink earned 109 total points
ID: 10919704
Open Access, but do not select a database to open.  Then try the repair option from the Tools menu.  Sounds like your db may have been corrupted.  
0
 
LVL 10

Assisted Solution

by:TOPIO
TOPIO earned 108 total points
ID: 10920216
Or if the fix does not work , open a new database  and do FILE ->GET EXTERNAL DATA -> IMPORT and select all the objects in your old database, if you get an error message in one you can restart the process skipping that one
0
 
LVL 54

Assisted Solution

by:nico5038
nico5038 earned 108 total points
ID: 10922926
Hi Alwu,

Just when the options from routinet and TOPIO don't work here my checklist for the MS Access database recovery:

1) Create a backup of the corrupt database. (Just in case of)

2) Create a new database and use File/Get external data/Import to get all objects of the damaged database.

3) Try these Microsoft solutions:
Repair A97/A2000:
http://support.microsoft.com/support/kb/articles/Q109/9/53.asp
Jetcomp:
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q273956
and/or read the article:
ACC2000: How to Troubleshoot Corruption in a Microsoft Access Database
http://support.microsoft.com/default.aspx?scid=kb;en-us;306204

4) Bit "heavier":
Access decompile:
http://www.granite.ab.ca/access/decompile.htm

5) Try a recovery tool:
Access recovery:
http://www.officerecovery.com/access/index.htm

6) Ask a company (will cost $$'s ! )
http://www.pksolutions.com/services.htm 

Nic;o)
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is a continuation or rather an extension from Cascading Combos (http://www.experts-exchange.com/A_5949.html) and builds on examples developed in detail there. It should be understandable alone, but I recommend reading the previous artic…
Overview: This article:       (a) explains one principle method to cross-reference invoice items in Quickbooks®       (b) explores the reasons one might need to cross-reference invoice items       (c) provides a sample process for creating a M…
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now