?
Solved

Covert hours

Posted on 2011-03-17
7
Medium Priority
?
332 Views
Last Modified: 2012-05-11
Hi Experts,
Is any way I can covert from 1 hour 30 min to 1.5 hours?

Thanks
0
Comment
Question by:jodstrr2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 3

Expert Comment

by:CarlsbergFTW
ID: 35157029
(minute_value / 60)  * 100 - gives you the percentage , pretty close to your need.
0
 

Author Comment

by:jodstrr2
ID: 35157062
here is my formula in my query
Hours: Format([EndTime]-[BeginTime],"h:mm") but the result is 1:30
0
 
LVL 3

Expert Comment

by:CarlsbergFTW
ID: 35157106
something like this in a select statement :

select ((to_char(sysdate,'hh')) ),((to_char(sysdate,'mm'))/60)*100 from dual

This select worked on ORACLE SQL.
0
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

 

Author Comment

by:jodstrr2
ID: 35157116
I'm not use ORACLE SQL, I'm using access 2003
0
 
LVL 3

Expert Comment

by:CarlsbergFTW
ID: 35157123
You can just work with the minute value as specified in my first post. It's basic math (calculating percentage)
0
 
LVL 120

Accepted Solution

by:
Rey Obrero (Capricorn1) earned 2000 total points
ID: 35157167

in access, use datediff

DateDiff("n", [BeginTime], [EndTime])/60

0
 

Author Closing Comment

by:jodstrr2
ID: 35157228
Thanks so much capricorn1!!!
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As tax season makes its return, so does the increase in cyber crime and tax refund phishing that comes with it
You need to know the location of the Office templates folder, so that when you create new templates, they are saved to that location, and thus are available for selection when creating new documents.  The steps to find the Templates folder path are …
In Microsoft Access, learn the trick to repeating sub-report headings at the top of each page. The problem with sub-reports and headings: Add a dummy group to the sub report using the expression =1: Set the “Repeat Section” property of the dummy…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question