Solved

Access Lock Files

Posted on 2011-03-16
4
905 Views
Last Modified: 2013-11-29
I have a A2010 application with an MDB backend, the lLDB lock file is removed if a menu screen is displayed that does not have a data source or until a form data source is opened. I can therefore copy/backup my backend MDB data from a menu screen or in the Open event of a form.

I have invoked the same code with a ACCDB backend and the LACCDB behaviour is different it remains present until all forms are closed thus preventing a Filecopy in the form open event.

Does anyone have a method for automating a FileCopy for data backup purposes in a form open event using an ACCDB frontend and backend?

As a note I have been able to circumvent this issue when exiting the application by invoking a Form close of the menu form, running the FIlecopy, then Quitting the application ... but still need the ability in a form open event.
0
Comment
Question by:ynot8669
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 75
ID: 35154094
Any open Form or other object that is bound to a linked table in the back end ... will result in the LACCDB file remaining present.

If you must ... you can get around this by use the File System Object and the copy commands contained within ... which will copy an open file, although not recommend to do so in general.

You can set a Reference to the Microsoft Scripting Runtime to get access to the FSO.


Capture1.gif
0
 
LVL 75

Accepted Solution

by:
DatabaseMX (Joe Anderson - Microsoft MVP, Access and Data Platform) earned 200 total points
ID: 35154098
0
 

Author Closing Comment

by:ynot8669
ID: 35154609
Great ...thanks for the prompt reply
0
 
LVL 75
ID: 35159341
You are welcome.

mx
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
In Microsoft Access, learn the trick to repeating sub-report headings at the top of each page. The problem with sub-reports and headings: Add a dummy group to the sub report using the expression =1: Set the “Repeat Section” property of the dummy…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question