Solved

Access 2007 only "Home" visible

Posted on 2011-03-23
4
285 Views
Last Modified: 2012-05-11
Hi,

I got a mdb file and need to update the logic behind. It is in the access 2000 format. When I open it in Access 2007 it opens in the run mode. I cannot open the design view.

How can I get it into design mode? Is there a brief introduction in Access2007 anywhere?

Thanks in advance
0
Comment
Question by:HugoHiasl
4 Comments
 
LVL 47

Accepted Solution

by:
Dale Fye (Access MVP) earned 167 total points
ID: 35198646
 It sounds like there is a startup form or macro, and you may be able to bypass this by holding down the Shift key until the application is loaded.
0
 
LVL 84

Assisted Solution

by:Scott McDaniel (Microsoft Access MVP - EE MVE )
Scott McDaniel (Microsoft Access MVP - EE MVE ) earned 166 total points
ID: 35199003
If you cannot open it via the Shift Key Bypass suggested by fyed, then you may be dealing with a .accde or .accdr file.

If it's an .accde file then you're out of luck - this is the "compiled" version of Access. You wouldn't be able to open these in Design view

If it is an .accdr file (the "runtime" format), you may be able to just change that extension to "accdb" and open it. You might still have to use the Shift Key trick.

0
 
LVL 74

Assisted Solution

by:Jeffrey Coachman
Jeffrey Coachman earned 167 total points
ID: 35199136
<Is there a brief introduction in Access2007 anywhere?>
Is this a separate question?

You can lean the basics of MS Access from books like this:

http://www.amazon.com/Microsoft-Office-Access-2007-Step/dp/0735623031/ref=sr_1_1?ie=UTF8&qid=1300891696&sr=8-1

http://www.amazon.com/Microsoft-Office-Access-Plain-Simple/dp/0735622922/ref=sr_1_11?ie=UTF8&qid=1300891696&sr=8-11

JeffCoachman
0
 
LVL 12

Author Closing Comment

by:HugoHiasl
ID: 35199160
Thanks to all.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In the previous article, Using a Critera Form to Filter Records (http://www.experts-exchange.com/A_6069.html), the form was basically a data container storing user input, which queries and other database objects could read. The form had to remain op…
As tax season makes its return, so does the increase in cyber crime and tax refund phishing that comes with it
Familiarize people with the process of utilizing SQL Server views from within Microsoft Access. Microsoft Access is a very powerful client/server development tool. One of the SQL Server objects that you can interact with from within Microsoft Access…
In Microsoft Access, learn the trick to repeating sub-report headings at the top of each page. The problem with sub-reports and headings: Add a dummy group to the sub report using the expression =1: Set the “Repeat Section” property of the dummy…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question