Solved

Access 2007, invoke Manage Replies wizard via on form cmb

Posted on 2010-08-23
4
619 Views
Last Modified: 2012-05-10
Hello all,

I am working on a local DB that will be used to track some training.  I would like to use the built in automation of the e-mail data collection capabilities. I have the structure and forms complete, I am just trying to make it so that my user does not have to navigate the ribbon to get to the Manage Replies wizard.

I have a cmbSendMail on my form, that I need to invoke the wizard.  I did some digging around MS, and TechNet but came up with very little that was helpful.

Thanks.

TLH
0
Comment
Question by:t_hungate
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 38

Accepted Solution

by:
puppydogbuddy earned 500 total points
ID: 33511042
Not much documentation available on how to do, but see this link for a good starting point:
         http://blogs.msdn.com/b/access/archive/2009/02/09/automate-data-collection-forms-using-vba.aspx
0
 
LVL 10

Author Comment

by:t_hungate
ID: 33513230
I looked over the msdn article, like you said there really isn't a lot of infor out there.  I think that might be a good start, if I can find the time to play with all of the different aspects metioned therein.

I am going to leave this question open for a bit to see if someone finds that magic nugget of info.

Thanks puppydogbuddy

TLH
0
 
LVL 38

Expert Comment

by:puppydogbuddy
ID: 33513809
0
 
LVL 10

Author Comment

by:t_hungate
ID: 33532261
After doing some reading and looking into it, I think this would be much more work than it is worth at the moment.  Thank you both for your participation, I will be splitting the point between the two of you.

TLH
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I see at least one EE question a week that pertains to using temporary tables in MS Access.  But surprisingly, I was unable to find a single article devoted solely to this topic. I don’t intend to describe all of the uses of temporary tables in t…
Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
With Microsoft Access, learn how to specify relationships between tables and set various options on the relationship. Add the tables: Create the relationship: Decide if you’re going to set referential integrity: Decide if you want cascade upda…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question