Solved

Could not delete from specified tables

Posted on 2010-09-15
6
714 Views
Last Modified: 2013-11-28
Hello,

I am receiving "Could not delete from specified tables" error when using this code.  Appreciate the help.

DELETE [Assignment - Deployed].*, [Project List].[Project Status]
FROM [Assignment - Deployed] INNER JOIN [Project List] ON [Assignment - Deployed].[Project ID] = [Project List].[Project ID]
WHERE ((([Project List].[Project Status])="Complete"));
0
Comment
Question by:dustywork
6 Comments
 
LVL 39

Expert Comment

by:als315
ID: 33683599
Is [Project List].[Project ID] key field?
 
0
 

Author Comment

by:dustywork
ID: 33683883
Yes.  Project ID is a key field in the Project List table.
0
 

Expert Comment

by:Lee-H
ID: 33683884
Do you have enforce referential integrity enabled on your relationships?
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 119

Accepted Solution

by:
Rey Obrero earned 125 total points
ID: 33683927
try this


DELETE [Assignment - Deployed].*
FROM [Assignment - Deployed], [Project List]
Where [Assignment - Deployed].[Project ID]
  IN (select [Project ID] from [Project List]
WHERE [Project Status]="Complete")
0
 
LVL 65

Assisted Solution

by:rockiroads
rockiroads earned 125 total points
ID: 33683939
your delete query contains multiple tables. if just deleting from one table then specify just that or try the UniqueRecords setting http://support.microsoft.com/kb/240098/en-us
0
 

Author Closing Comment

by:dustywork
ID: 33684646
Thanks to you both as I needed both to get to the solution.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I see at least one EE question a week that pertains to using temporary tables in MS Access.  But surprisingly, I was unable to find a single article devoted solely to this topic. I don’t intend to describe all of the uses of temporary tables in t…
Technology opened people to different means of presenting information, but PowerPoint remains to be above competition. Know why PPT still works today.
In Microsoft Access, when working with VBA, learn some techniques for writing readable and easily maintained code.
The view will learn how to download and install SIMTOOLS and FORMLIST into Excel, how to use SIMTOOLS to generate a Monte Carlo simulation of 30 sales calls, and how to calculate the conditional probability based on the results of the Monte Carlo …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now