Solved

Access Upsize to SQL Server 2005 - Extended Property = Append Only

Posted on 2009-04-09
2
543 Views
Last Modified: 2013-11-29
I'm upsizing an Access 2003 DB to SQL Server 2005.  The Upsize Wizard generated the following code.  What is the Extended Property "Append Only" all about?  Note that InsuranceCoID is the PK column.
IF NOT EXISTS (SELECT * FROM ::fn_listextendedproperty(N'AppendOnly' , N'SCHEMA',N'dbo', N'TABLE',N'tlkupInsuranceName', N'COLUMN',N'InsuranceCoID'))
EXEC sys.sp_addextendedproperty @name=N'AppendOnly', @value=N'False' , @level0type=N'SCHEMA',@level0name=N'dbo', @level1type=N'TABLE',@level1name=N'tlkupInsuranceName', @level2type=N'COLUMN',@level2name=N'InsuranceCoID'
GO

Open in new window

0
Comment
Question by:jdana
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Accepted Solution

by:
jmoss111 earned 250 total points
ID: 24107010
You'll get better results in upsizing if you switch from the upsizing wizard to SQL Server Migration Assistant for Access.  Migration Assistant is a much better alternative that basically replaced upsizing wizard, free from Microsoft.

http://www.microsoft.com/downloads/details.aspx?FamilyId=D842F8B4-C914-4AC7-B2F3-D25FFF4E24FB&displaylang=en
0
 

Author Closing Comment

by:jdana
ID: 31568492
I'll give it a shot.
0

Featured Post

Free eBook: Backup on AWS

Everything you need to know about backup and disaster recovery with AWS, for FREE!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This article describes a method of delivering Word templates for use in merging Access data to Word documents, that requires no computer knowledge on the part of the recipient -- the templates are saved in table fields, and are extracted and install…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question