Solved

Disable F12 Key on all the Access Form?

Posted on 2008-10-14
6
876 Views
Last Modified: 2013-11-29
When click the F12 key on any form of Acces, the default action is pop up a window save form as......, I don't like to show this thing for customer, i know it can set the keyDown function keyCode =0, but have to set every form, I think this thing can make a gobal method or function to set it, how?
0
Comment
Question by:Uncochen
  • 3
  • 2
6 Comments
 
LVL 48

Expert Comment

by:jpaulino
ID: 22717500
You can simply selec Tools - Startup and uncheck "Use Access Special Keys".
You also can find some workarounds in here:
http://www.experts-exchange.com/Microsoft/Development/MS_Access/Q_23144529.html 
0
 
LVL 48

Expert Comment

by:jpaulino
ID: 22717514
Please ignore my first comment. F12 doesn't belong to Access Special Keys.
Try the workarounds
0
 
LVL 120

Expert Comment

by:Rey Obrero (Capricorn1)
ID: 22720361
create a macro

from the database objects window, select macro > new
click the Macro Names icon from the tool bar to show the Macro Names column in the macro designer window
in that column type  {F12}    include the curly braces
save the macro as  AutoKeys  
done...
0
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

 

Author Comment

by:Uncochen
ID: 22726482
Hi capricorn1, Sorry! I am not very understand what your description, Can you upload a sample for me please! thank you!
0
 
LVL 120

Accepted Solution

by:
Rey Obrero (Capricorn1) earned 500 total points
ID: 22726580
try this
dbAutoKeys.mdb
0
 
LVL 120

Expert Comment

by:Rey Obrero (Capricorn1)
ID: 22736339
with all the instruction  plus the example db... you gave a grade of B????
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction When developing Access applications, often we need to know whether an object exists.  This article presents a quick and reliable routine to determine if an object exists without that object being opened. If you wanted to inspect/ite…
Experts-Exchange is a great place to come for help with solutions for your database issues, and many problems are resolved within minutes of being posted.  Others take a little more time and effort and often providing a sample database is very helpf…
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
In Microsoft Access, learn how to “cascade” or have the displayed data of one combo control depend upon what’s entered in another. Base the dependent combo on a query for its row source: Add a reference to the first combo on the form as criteria i…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question