Solved

Access Lock Fields in Table Design View

Posted on 2009-07-09
7
986 Views
Last Modified: 2013-11-29
Is there way to lock fields in table design view so that the entered values cannot be changed.

Thanks.
0
Comment
Question by:tahirih
7 Comments
 
LVL 120

Assisted Solution

by:Rey Obrero (Capricorn1)
Rey Obrero (Capricorn1) earned 50 total points
ID: 24819326
No.
Lock the form controls bound to the field.
0
 
LVL 4

Accepted Solution

by:
neil_squires earned 150 total points
ID: 24819810
It sounds like you are trying to duplicate functionality similar to an Excel where you can lock the fields and view them in a grid fashion.  Unfortunately, while an access table may look like an excel sheet, it behaves differently.

Best practices are to use a form to view/update the data in an Access database.  You can lock the fields a couple of different ways.  The simplest is to make the fields locked or disabled.  If you want the same look as Excel, you can also run a form in Data View rather than formview.  This will look similar to the table layout and is harder to work with than form view, but is doable.

HTH
0
 
LVL 57

Assisted Solution

by:Jim Dettman (Microsoft MVP/ EE MVE)
Jim Dettman (Microsoft MVP/ EE MVE) earned 150 total points
ID: 24822554
<<Is there way to lock fields in table design view so that the entered values cannot be changed.>>
  You'd have to user user level security to secure the table design.  However ULS is a bit complex and you should understand it fully before trying to implement it.  Also be aware that the feature has been dropped starting with Access 2007.
 You can download the Access Security FAQ here:
http://support.microsoft.com/?id=207793
and Joan Wild keeps a good page on Access security:
http://www.jmwild.com/Accesssecurity.htm
JimD.
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 74

Assisted Solution

by:Jeffrey Coachman
Jeffrey Coachman earned 150 total points
ID: 24824313
tahirih,

Or, depending on what the user should (or should not) be doing, you can simply open the form in "Read Only" mode:

  DoCmd.OpenForm "YourFormName", , , , acFormReadOnly

This will save you the trouble of figuring out which fields to Lock/Enable/Disable and when.

;-)

JeffCoachman
0
 
LVL 120

Assisted Solution

by:Rey Obrero (Capricorn1)
Rey Obrero (Capricorn1) earned 50 total points
ID: 24824387
yeah you could do that if you want to lock *ALL* the fields/controls, but it guess that is not the case here.
0
 

Author Comment

by:tahirih
ID: 24824804
Sorry everyone for the delayed response, I am not getting e-mail notification that answers have been posted.

0
 

Author Closing Comment

by:tahirih
ID: 31601861
Thanks.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article is a continuation or rather an extension from Cascading Combos (http://www.experts-exchange.com/A_5949.html) and builds on examples developed in detail there. It should be understandable alone, but I recommend reading the previous artic…
Overview: This article:       (a) explains one principle method to cross-reference invoice items in Quickbooks®       (b) explores the reasons one might need to cross-reference invoice items       (c) provides a sample process for creating a M…
In Microsoft Access, learn how to use Dlookup and other domain aggregate functions and one method of specifying a string value within a string. Specify the first argument, which is the expression to be returned: Specify the second argument, which …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question